Narrow Search
Last searches

Results for *

Displaying results 1 to 5 of 5.

  1. Al Qaeda's scorecard
    a progress report on Al Qaeda's objectives
    Author: Abrahms, Max
    Published: 2006

    Fachinformationsverbund Internationale Beziehungen und Länderkunde
    No loan of volumes, only paper copies will be sent
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Article (journal)
    Format: Print
    Parent title: In: Studies in conflict & terrorism; Philadelphia, Pa. [u.a.] : Taylor & Francis, 1992; 29(2006), 5, Seite 509-529

    Subjects: Kollektive Sicherheit; Umweltgefährdung; Weltproblematik; Internationaler Terrorismus; Terrorismus; Bekämpfung; Bedrohungsvorstellung; Kriegsziel; Schutzvorrichtung; Motivation; Gewalt; Religion; Internationale Sicherheit
  2. Terrorist targeting and energy security
    Author: Toft, Peter
    Published: 2010

    Fachinformationsverbund Internationale Beziehungen und Länderkunde
    No loan of volumes, only paper copies will be sent
    Export to reference management software   RIS file
      BibTeX file
    Source: Union catalogues
    Language: English
    Media type: Article (journal)
    Format: Print
    Parent title: In: Energy policy; Oxford : Elsevier, 1973; 38(2010), 8, Seite 411-4421

    Subjects: Energiewirtschaft; Kriegsziel; Schutzvorrichtung; Energieversorgung; Versorgungssicherheit; Bedrohungsvorstellung; Attentat; Terrorismus; Terrorist; Motivation; Beispiel; Entwicklung
  3. World War C
    understanding nation-state motives behind today's advanced cyber attacks
    Published: 2014

    Fachinformationsverbund Internationale Beziehungen und Länderkunde
    No inter-library loan
    Export to reference management software   RIS file
      BibTeX file
    Content information
  4. Modul Einführung Cyberwar
    [Studienbrief 1-5]
    Published: 2013
    Publisher:  Freie Univ. Berlin, Berlin

    Enthält: Studienbrief 1: Was ist Cyberwar? - 33 S. - Studienbrief 2: Der militärische Hacker. - 33 S. - Studienbrief 3: Ziele und Operationstypen des Cyberwars. - 33 S. - Studienbrief 4: Merkmale des Cyberwars. - 34 S. - Studienbrief 5: Einordnung... more

    Fachinformationsverbund Internationale Beziehungen und Länderkunde
    No inter-library loan

     

    Enthält: Studienbrief 1: Was ist Cyberwar? - 33 S. - Studienbrief 2: Der militärische Hacker. - 33 S. - Studienbrief 3: Ziele und Operationstypen des Cyberwars. - 33 S. - Studienbrief 4: Merkmale des Cyberwars. - 34 S. - Studienbrief 5: Einordnung des Cyberwars. - 36 S

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Source: Union catalogues
    Language: German
    Media type: Book
    Format: Online
    Edition: 1. Aufl.
    Subjects: Informationstechnik; Kommunikationstechnik; Krieg; Information warfare; Kriegsziel; Schutzvorrichtung; Kosten-Nutzen-Analyse; Kosten-Nutzen-Kalkulation; Militär; Hacker; Strategie; Motivation; Militärisches Objekt; Militärische Anlage; Infrastruktur; Effektivität; Aufwendung; Kosten
    Scope: Online Ressource (getr. Zähl.)
    Notes:

    Enthält: Studienbrief 1: Was ist Cyberwar? - 33 S. - Studienbrief 2: Der militärische Hacker. - 33 S. - Studienbrief 3: Ziele und Operationstypen des Cyberwars. - 33 S. - Studienbrief 4: Merkmale des Cyberwars. - 34 S. - Studienbrief 5: Einordnung des Cyberwars. - 36 S.

  5. Cyber operations in Russia's war against Ukraine
    uses, limitations, and lessons learned so far
    Published: [April 2023]
    Publisher:  SWP, Berlin

    One year after Russia's invasion of Ukraine, certain assumptions about the utility of cyber operations during wartime can now be put to the test. Russian cyber salvos opened this war, but they failed to achieve their objectives in the face of a... more

    Fachinformationsverbund Internationale Beziehungen und Länderkunde
    No inter-library loan
    Stiftung Wissenschaft und Politik (SWP), Bibliothek
    No inter-library loan
    ZBW - Leibniz-Informationszentrum Wirtschaft, Standort Kiel
    DSP 386
    No inter-library loan

     

    One year after Russia's invasion of Ukraine, certain assumptions about the utility of cyber operations during wartime can now be put to the test. Russian cyber salvos opened this war, but they failed to achieve their objectives in the face of a resilient cyber defender. Joint cyber/conventional warfighting is still hard to implement due to its uncertain effects, the potential for spill-over, malware development cycles, and differing operational tempos. Cyber operations against Ukraine have not (yet) achieved major strategic effects in reducing Ukraine's capacity to resist. Additionally, Russian information operations targeting Ukrainian and Western audiences fell on deaf ears. The greatest value of cyber operations therefore still appears to lie in their intelligence and reconnaissance functions.

     

    Export to reference management software   RIS file
      BibTeX file
    Content information
    Volltext (kostenfrei)