Cyberdeterrence and cyberwar / / Martin C. Libicki.
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but th...
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2009 |
Language: | English |
Physical Description: | 1 online resource (239 p.) |
Notes: | Description based upon print version of record. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 01166nam a2200313Ia 4500 | ||
---|---|---|---|
001 | 993628515904498 | ||
005 | 20200520144314.0 | ||
006 | m o d | | ||
007 | cr -n--------- | ||
008 | 090722s2009 cau ob 000 0 eng d | ||
020 | |a 1-282-39853-9 | ||
020 | |a 9786612398537 | ||
020 | |a 0-8330-4875-9 | ||
035 | |a (CKB)2550000000005577 | ||
035 | |a (EBL)475081 | ||
035 | |a (OCoLC)559030468 | ||
035 | |a (SSID)ssj0000336454 | ||
035 | |a (PQKBManifestationID)11251861 | ||
035 | |a (PQKBTitleCode)TC0000336454 | ||
035 | |a (PQKBWorkID)10281871 | ||
035 | |a (PQKB)11468542 | ||
035 | |a (Au-PeEL)EBL475081 | ||
035 | |a (CaPaEBR)ebr10354100 | ||
035 | |a (Au-PeEL)EBL4970005 | ||
035 | |a (CaONFJC)MIL239853 | ||
035 | |a (MiAaPQ)EBC475081 | ||
035 | |a (MiAaPQ)EBC4970005 | ||
035 | |a (EXLCZ)992550000000005577 | ||
040 | |a MiAaPQ |b eng |e rda |e pn |c MiAaPQ |d MiAaPQ | ||
041 | |a eng | ||
050 | 4 | |a U163 |b .L539 2009 | |
082 | 0 | 0 | |a 363.3250973 |
100 | 1 | |a Libicki, Martin C. | |
245 | 1 | 0 | |a Cyberdeterrence and cyberwar / |c Martin C. Libicki. |
260 | |a Santa Monica, CA : |b RAND, |c 2009. | ||
300 | |a 1 online resource (239 p.) | ||
336 | |a text |b txt | ||
337 | |a computer |b c | ||
338 | |a online resource |b cr | ||
500 | |a Description based upon print version of record. | ||
505 | 0 | |a Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgements; Abbreviations; CHAPTER ONE - Introduction; CHAPTER TWO - A Conceptual Framework; CHAPTER THREE - Why Cyberdeterrence Is Different; CHAPTER FOUR - Why the Purpose of the Original CyberattackMatters; CHAPTER FIVE - A Strategy of Response; CHAPTER SIX - Strategic Cyberwar; CHAPTER SEVEN - Operational Cyberwar; CHAPTER EIGHT - Cyberdefense; CHAPTER NINE - Tricky Terrain; APPENDIX A - What Constitutes an Act of War in Cyberspace?; APPENDIX B - The Calculus of Explicit Versus Implicit Deterrence | |
505 | 8 | |a APPENDIX C - The Dim Prospects for Cyber Arms ControlReferences | |
520 | |a Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack. | ||
546 | |a English | ||
588 | |a Description based on publisher supplied metadata and other sources. | ||
504 | |a Includes bibliographical references. | ||
650 | 0 | |a Information warfare |z United States. | |
650 | 0 | |a Cyberterrorism |z United States |x Prevention. | |
650 | 0 | |a Cyberspace |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures |z United States. | |
650 | 0 | |a Civil defense |z United States. | |
776 | |z 0-8330-4734-5 | ||
710 | 2 | |a Project Air Force (U.S.) | |
906 | |a BOOK | ||
999 | |p $33.50 |u 10/27/2014 |5 Hist | ||
ADM | |b 2024-08-03 22:26:33 Europe/Vienna |f system |c marc21 |a 2012-02-25 22:41:52 Europe/Vienna |g false | ||
AVE | |i DOAB Directory of Open Access Books |P DOAB Directory of Open Access Books |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350513160004498&Force_direct=true |Z 5350513160004498 |b Available |8 5350513160004498 |