NDU-K Library Catalogue

Girl in a jacket 

Cyber war versus cyber realities : (Record no. 5515)

MARC details
000 -LEADER
fixed length control field 04148cam a2200349 i 4500
001 - CONTROL NUMBER
control field 18448954
003 - CONTROL NUMBER IDENTIFIER
control field KE-NaNDC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230128183639.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 150114s2015 enk 000 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2014039240
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9780190204792 (hardback)
040 ## - CATALOGING SOURCE
Original cataloging agency DLC
Language of cataloging eng
Transcribing agency DLC
Description conventions rda
Modifying agency DLC
042 ## - AUTHENTICATION CODE
Authentication code pcc
050 00 - LIBRARY OF CONGRESS CALL NUMBER
Classification number U163
Item number .V36 2015
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 355.4
Edition number 23
084 ## - OTHER CLASSIFICATION NUMBER
Classification number POL011000
-- POL012000
Number source bisacsh
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Valeriano, Brandon.
245 10 - TITLE STATEMENT
Title Cyber war versus cyber realities :
Remainder of title cyber conflict in the international system /
Statement of responsibility, etc. Brandon Valeriano and Ryan C. Maness.
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 266 pages :
Dimensions 25 cm
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Machine generated contents note: -- Preface -- Acknowledgements -- Chapter 1: The Contours of the Cyber Conflict World -- Chapter 2: Cyberpower, Cyber Weapons, and Cyber Operations -- Chapter 3: Theories of Cyber Conflict: Restraint, Regionalism, Espionage, and Cyber Terrorism in the Digital Era -- Chapter 4: The Dynamics of Cyber Conflict between Rival Antagonists -- Chapter 5: The Impact of Cyber Incidents: Events and the Conflict-Cooperation Nexus -- Chapter 6: Stuxnet, Shamoon, and Bronze Soldier: The Impact and Responses to Cyber Operations -- Chapter 7: Cyber Conflict and Non-State Actors: Weapons of Fear -- Chapter 8: Cyber Rules: Encouraging a System of Justice and Proportionality in Cyber Operations -- Chapter 9: Conclusion -- Tables and Figures.
520 ## - SUMMARY, ETC.
Summary, etc. "In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of cyber conflict has brought about a reorientation of military affairs. What is the reality of this threat? Is it actual or inflated, fear or fact-based? Taking a bold stand against the mainstream wisdom, Valeriano and Maness argue that there is very little evidence that cyber war is, or is likely to become, a serious threat. Their claim is empirically grounded, involving a careful analysis of cyber incidents and disputes experienced by international states since 2001, and an examination of the processes leading to cyber conflict. As the authors convincingly show, cyber incidents are a little-used tactic, with low-level intensity and few to no long-term effects. As well, cyber incidents are motivated by the same dynamics that prompt regional conflicts. Based on this evidence, Valeriano and Maness lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--
520 ## - SUMMARY, ETC.
Summary, etc. "What Valeriano and Maness provide in this book is an empirically-grounded discussion of the reality of cyber conflict, based on an analysis of cyber incidents and disputes experienced by international states since 2001. They delineate patterns of cyber conflict to develop a larger theory of cyber war that gets at the processes leading to cyber conflict. They find that, in addition to being a little-used tactic, cyber incidents thus far have been of a rather low-level intensity and with few to no long-term effects. Interestingly, they also find that many cyber incidents are motivated by regional conflict. They argue that restraint is the norm in cyberspace and suggest there is evidence this norm can influence how the tactic is used in the future. In conclusion, the authors lay out a set of policy recommendations for proper defense against cyber threats that is built on restraint and regionalism"--
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberspace operations (Military science)
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Technology and international relations.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Internet and international relatins.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element POLITICAL SCIENCE / International Relations / General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element POLITICAL SCIENCE / Political Freedom & Security / International Security.
Source of heading or term bisacsh
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Maness, Ryan C.
856 42 - ELECTRONIC LOCATION AND ACCESS
Materials specified Book review (H-Net)
Uniform Resource Identifier <a href="http://www.h-net.org/reviews/showrev.php?id=44981">http://www.h-net.org/reviews/showrev.php?id=44981</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Koha item type Book
Koha issues (borrowed), all copies 1
Holdings
Withdrawn status Lost status Damaged status Not for loan Home library Current library Date acquired Total Checkouts Full call number Barcode Date last seen Date last checked out Price effective from Koha item type
        National Defence College (NDC) Library National Defence College (NDC) Library 01/12/2018 1 U163 .V36 2015 9535/17 03/20/2019 02/13/2019 01/12/2018 Book
Copyright © 2023 [National Defence University - Kenya]. All rights reserved.