Cyberdeterrence and cyberwar / / Martin C. Libicki.

Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but th...

Full description

Saved in:
Bibliographic Details
:
TeilnehmendeR:
Year of Publication:2009
Language:English
Physical Description:1 online resource (239 p.)
Notes:Description based upon print version of record.
Tags: Add Tag
No Tags, Be the first to tag this record!
LEADER 01166nam a2200313Ia 4500
001 993628515904498
005 20200520144314.0
006 m o d |
007 cr -n---------
008 090722s2009 cau ob 000 0 eng d
020 |a 1-282-39853-9 
020 |a 9786612398537 
020 |a 0-8330-4875-9 
035 |a (CKB)2550000000005577 
035 |a (EBL)475081 
035 |a (OCoLC)559030468 
035 |a (SSID)ssj0000336454 
035 |a (PQKBManifestationID)11251861 
035 |a (PQKBTitleCode)TC0000336454 
035 |a (PQKBWorkID)10281871 
035 |a (PQKB)11468542 
035 |a (Au-PeEL)EBL475081 
035 |a (CaPaEBR)ebr10354100 
035 |a (Au-PeEL)EBL4970005 
035 |a (CaONFJC)MIL239853 
035 |a (MiAaPQ)EBC475081 
035 |a (MiAaPQ)EBC4970005 
035 |a (EXLCZ)992550000000005577 
040 |a MiAaPQ  |b eng  |e rda  |e pn  |c MiAaPQ  |d MiAaPQ 
041 |a eng 
050 4 |a U163  |b .L539 2009 
082 0 0 |a 363.3250973 
100 1 |a Libicki, Martin C. 
245 1 0 |a Cyberdeterrence and cyberwar /  |c Martin C. Libicki. 
260 |a Santa Monica, CA :  |b RAND,  |c 2009. 
300 |a 1 online resource (239 p.) 
336 |a text  |b txt 
337 |a computer  |b c 
338 |a online resource  |b cr 
500 |a Description based upon print version of record. 
505 0 |a Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgements; Abbreviations; CHAPTER ONE - Introduction; CHAPTER TWO - A Conceptual Framework; CHAPTER THREE - Why Cyberdeterrence Is Different; CHAPTER FOUR - Why the Purpose of the Original CyberattackMatters; CHAPTER FIVE - A Strategy of Response; CHAPTER SIX - Strategic Cyberwar; CHAPTER SEVEN - Operational Cyberwar; CHAPTER EIGHT - Cyberdefense; CHAPTER NINE - Tricky Terrain; APPENDIX A - What Constitutes an Act of War in Cyberspace?; APPENDIX B - The Calculus of Explicit Versus Implicit Deterrence 
505 8 |a APPENDIX C - The Dim Prospects for Cyber Arms ControlReferences 
520 |a Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack. 
546 |a English 
588 |a Description based on publisher supplied metadata and other sources. 
504 |a Includes bibliographical references. 
650 0 |a Information warfare  |z United States. 
650 0 |a Cyberterrorism  |z United States  |x Prevention. 
650 0 |a Cyberspace  |x Security measures. 
650 0 |a Computer networks  |x Security measures  |z United States. 
650 0 |a Civil defense  |z United States. 
776 |z 0-8330-4734-5 
710 2 |a Project Air Force (U.S.) 
906 |a BOOK 
999 |p $33.50  |u 10/27/2014  |5 Hist 
ADM |b 2024-08-03 22:26:33 Europe/Vienna  |f system  |c marc21  |a 2012-02-25 22:41:52 Europe/Vienna  |g false 
AVE |i DOAB Directory of Open Access Books  |P DOAB Directory of Open Access Books  |x https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350513160004498&Force_direct=true  |Z 5350513160004498  |b Available  |8 5350513160004498