LEADER 05649nam 2200709 a 450 001 996426339703316 005 20200520144314.0 010 $a0-12-407926-1 035 $a(CKB)2660000000011102 035 $a(EBL)1115159 035 $a(OCoLC)846492852 035 $a(SSID)ssj0000885464 035 $a(PQKBManifestationID)11536564 035 $a(PQKBTitleCode)TC0000885464 035 $a(PQKBWorkID)10953554 035 $a(PQKB)10088012 035 $a(MiAaPQ)EBC1115159 035 $a(CaSebORM)9780124078147 035 $a(Au-PeEL)EBL1115159 035 $a(CaPaEBR)ebr10704774 035 $a(CaONFJC)MIL492311 035 $a(EXLCZ)992660000000011102 100 $a20130429d2013 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aIntroduction to cyber-warfare$b[electronic resource] $ea multidisciplinary approach /$fPaulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia 205 $a1st edition 210 $aAmsterdam [Netherlands] $cMorgan Kaufmann Publishers, an imprint of Elsevier$d2013 215 $a1 online resource (256 p.) 300 $aDescription based upon print version of record. 311 $a0-12-407814-1 320 $aIncludes bibliographical references and index. 327 $aFront Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service 327 $aThe Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ?s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary 327 $aCyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ? ? of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading 327 $aReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ? ?; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes 327 $aThe Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ? ? Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ? Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology 327 $aArab Spring 330 $aIntroduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.Provides a multi-disciplinary approach t 606 $aInformation warfare$vCase studies 606 $aCyberterrorism 606 $aCyberspace$xSecurity measures 606 $aComputer crimes 606 $aData protection 608 $aElectronic books. 615 0$aInformation warfare 615 0$aCyberterrorism. 615 0$aCyberspace$xSecurity measures. 615 0$aComputer crimes. 615 0$aData protection. 676 $a355.4 700 $aShakarian$b Paulo$0791399 701 $aShakarian$b Jana$0791400 701 $aRuef$b Andrew$0791401 801 0$bMiAaPQ 906 $aBOOK 912 $a996426339703316 996 $aIntroduction to cyber-warfare$91768809 997 $aUNISA LEADER 02985oam 2200673I 450 001 9910784696603321 005 20230421044027.0 010 $a1-85390-187-3 010 $a1-134-76156-2 010 $a1-134-76157-0 010 $a1-280-14993-0 010 $a9786610149933 010 $a0-203-99006-4 024 7 $a10.4324/9780203990063 035 $a(CKB)1000000000360877 035 $a(EBL)235111 035 $a(OCoLC)226376617 035 $a(SSID)ssj0000121976 035 $a(PQKBManifestationID)11135240 035 $a(PQKBTitleCode)TC0000121976 035 $a(PQKBWorkID)10110906 035 $a(PQKB)11024535 035 $a(MiAaPQ)EBC235111 035 $a(Au-PeEL)EBL235111 035 $a(CaPaEBR)ebr10093794 035 $a(CaONFJC)MIL14993 035 $a(OCoLC)226376617 035 $a(EXLCZ)991000000000360877 100 $a20180331d1996 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aChrist's body $eidentity, culture, and society in late medieval writings /$fSarah Beckwith 210 1$aLondon :$cRoutledge,$d1996. 215 $a1 online resource (212 p.) 300 $aDescription based upon print version of record. 311 $a1-138-17491-2 311 $a0-415-14426-4 320 $aIncludes bibliographical references and index. 327 $aPreliminaries; CONTENTS; Acknowledgements; Introduction; 1 THE TRANSCENDENT AND THE HISTORICAL Inventing the discourse of mysticism; 2 CHRIST'S BODY AND THE IMAGING OF SOCIAL ORDER; 3 DYVERSE IMAGINACIOUNS OF CRYSTES LYF Subjectivity embodiment and crucifixion piety; 4 THE USES OF CORPUS CHRISTI AND THE BOOK OF MARGERY KEMPE; CONCLUSION; Notes; Works cited; Index 330 $aAt the very heart of Christian doctrine and late medieval practice was the image of the crucified Christ. Sarah Beckwith examines the social meaning of this image across a range of key devotional English texts, using insights from anthropology and cultural studies. The image of the crucified Christ, she argues, acted as a place where the tensions between the sacred and the profane, the individual and the collective, were played out. The medieval obsession with the contours of Christ's body functioned to challenge and transform social and political relations. A fascinating and challengi 606 $aChristian art and symbolism$yMedieval, 500-1500 606 $aDevotional literature$xHistory and criticism 606 $aHuman body$xReligious aspects$xChristianity 615 0$aChristian art and symbolism 615 0$aDevotional literature$xHistory and criticism. 615 0$aHuman body$xReligious aspects$xChristianity. 676 $a2480940902 676 $a809.93382 700 $aBeckwith$b Sarah$f1959,$01500338 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910784696603321 996 $aChrist's body$93726972 997 $aUNINA