Russian Cyber Operations.pdf

(2235 KB) Pobierz
RUSSIAN CYBER
OPERATIONS
Other Titles of Interest from Georgetown University Press
Conflict and Cooperation in the Global Commons:
A Comprehensive Approach for International Security
edited by Scott Jasper
Cyber Blockades
by Alison Lawlor Russell
Cyberspace and National Security: Threats, Opportunities, and
Power in a Virtual World
edited by Derek S. Reveron
Hacking the Bomb: Cyber Threats and Nuclear Weapons
by Andrew Futter
Optimizing Cyberdeterrence: A Comprehensive Strategy for
Preventing Foreign Cyberattacks
by Robert Mandel
The Russian Understanding of War: Blurring the Lines between
War and Peace
by Oscar Jonsson
Strategy, Evolution, and War: From Apes to Artificial Intelligence
by Kenneth Payne
Understanding Cyber Conflict: Fourteen Analogies
edited by George Perkovich and Ariel E. Levite
RUSSIAN CYBER
OPERATIONS
CODING THE BOUNDARIES
OF CONFLICT
SCOTT JASPER
Foreword by Gen. Keith Alexander, USA (Ret.)
GEORGETOWN UNIVERSITY PRESS
WASHINGTON, DC
© 2020 Georgetown University Press. All rights reserved. No part of this book may be
reproduced or utilized in any form or by any means, electronic or mechanical, includ-
ing photocopying and recording, or by any information storage and retrieval system,
without permission in writing from the publisher.
The publisher is not responsible for third-party websites or their content. URL links
were active at time of publication.
Library of Congress Cataloging-in-Publication Data
Names: Jasper, Scott, author.
Title: Russian Cyber Operations : Coding the Boundaries of Conflict / Scott
Jasper.
Description: Washington, DC : Georgetown University Press, 2020. | Includes
bibliographical references and index.
Identifiers: LCCN 2019038780 (print) | LCCN 2019038781 (ebook) | ISBN
9781626167971 (hardcover) | ISBN 9781626167995 (ebook)
Subjects: LCSH: Cyberspace operations (Military science)—Russia
(Federation) | Information warfare—Russia (Federation) | Hybrid
warfare—Russia (Federation) | Asymmetric warfare—Russia (Federation) |
Cyber intelligence (Computer security)—United States. | Computer
security—United States.
Classification: LCC U167.5.C92 J375 2020 (print) | LCC U167.5.C92 (ebook)
| DDC 355.4/1—dc23
LC record available at https://lccn.loc.gov/2019038780
LC ebook record available at https://lccn.loc.gov/2019038781
This book is printed on acid-free paper meeting the requirements of the American
National Standard for Permanence in Paper for Printed Library Materials.
21 20
9 8 7 6 5 4 3 2 First printing
Printed in the United States of America.
Jacket design by Martyn Schmoll.
Zgłoś jeśli naruszono regulamin