Cyberdeterrence and cyberwar / / Martin C. Libicki.
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but th...
Saved in:
: | |
---|---|
TeilnehmendeR: | |
Year of Publication: | 2009 |
Language: | English |
Physical Description: | 1 online resource (239 p.) |
Notes: | Description based upon print version of record. |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
993628515904498 |
---|---|
ctrlnum |
(CKB)2550000000005577 (EBL)475081 (OCoLC)559030468 (SSID)ssj0000336454 (PQKBManifestationID)11251861 (PQKBTitleCode)TC0000336454 (PQKBWorkID)10281871 (PQKB)11468542 (Au-PeEL)EBL475081 (CaPaEBR)ebr10354100 (Au-PeEL)EBL4970005 (CaONFJC)MIL239853 (MiAaPQ)EBC475081 (MiAaPQ)EBC4970005 (EXLCZ)992550000000005577 |
collection |
bib_alma |
record_format |
marc |
spelling |
Libicki, Martin C. Cyberdeterrence and cyberwar / Martin C. Libicki. Santa Monica, CA : RAND, 2009. 1 online resource (239 p.) text txt computer c online resource cr Description based upon print version of record. Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgements; Abbreviations; CHAPTER ONE - Introduction; CHAPTER TWO - A Conceptual Framework; CHAPTER THREE - Why Cyberdeterrence Is Different; CHAPTER FOUR - Why the Purpose of the Original CyberattackMatters; CHAPTER FIVE - A Strategy of Response; CHAPTER SIX - Strategic Cyberwar; CHAPTER SEVEN - Operational Cyberwar; CHAPTER EIGHT - Cyberdefense; CHAPTER NINE - Tricky Terrain; APPENDIX A - What Constitutes an Act of War in Cyberspace?; APPENDIX B - The Calculus of Explicit Versus Implicit Deterrence APPENDIX C - The Dim Prospects for Cyber Arms ControlReferences Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack. English Description based on publisher supplied metadata and other sources. Includes bibliographical references. Information warfare United States. Cyberterrorism United States Prevention. Cyberspace Security measures. Computer networks Security measures United States. Civil defense United States. 0-8330-4734-5 Project Air Force (U.S.) |
language |
English |
format |
eBook |
author |
Libicki, Martin C. |
spellingShingle |
Libicki, Martin C. Cyberdeterrence and cyberwar / Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgements; Abbreviations; CHAPTER ONE - Introduction; CHAPTER TWO - A Conceptual Framework; CHAPTER THREE - Why Cyberdeterrence Is Different; CHAPTER FOUR - Why the Purpose of the Original CyberattackMatters; CHAPTER FIVE - A Strategy of Response; CHAPTER SIX - Strategic Cyberwar; CHAPTER SEVEN - Operational Cyberwar; CHAPTER EIGHT - Cyberdefense; CHAPTER NINE - Tricky Terrain; APPENDIX A - What Constitutes an Act of War in Cyberspace?; APPENDIX B - The Calculus of Explicit Versus Implicit Deterrence APPENDIX C - The Dim Prospects for Cyber Arms ControlReferences |
author_facet |
Libicki, Martin C. Project Air Force (U.S.) Project Air Force (U.S.) |
author_variant |
m c l mc mcl |
author2 |
Project Air Force (U.S.) |
author2_role |
TeilnehmendeR |
author_corporate |
Project Air Force (U.S.) |
author_sort |
Libicki, Martin C. |
title |
Cyberdeterrence and cyberwar / |
title_full |
Cyberdeterrence and cyberwar / Martin C. Libicki. |
title_fullStr |
Cyberdeterrence and cyberwar / Martin C. Libicki. |
title_full_unstemmed |
Cyberdeterrence and cyberwar / Martin C. Libicki. |
title_auth |
Cyberdeterrence and cyberwar / |
title_new |
Cyberdeterrence and cyberwar / |
title_sort |
cyberdeterrence and cyberwar / |
publisher |
RAND, |
publishDate |
2009 |
physical |
1 online resource (239 p.) |
contents |
Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgements; Abbreviations; CHAPTER ONE - Introduction; CHAPTER TWO - A Conceptual Framework; CHAPTER THREE - Why Cyberdeterrence Is Different; CHAPTER FOUR - Why the Purpose of the Original CyberattackMatters; CHAPTER FIVE - A Strategy of Response; CHAPTER SIX - Strategic Cyberwar; CHAPTER SEVEN - Operational Cyberwar; CHAPTER EIGHT - Cyberdefense; CHAPTER NINE - Tricky Terrain; APPENDIX A - What Constitutes an Act of War in Cyberspace?; APPENDIX B - The Calculus of Explicit Versus Implicit Deterrence APPENDIX C - The Dim Prospects for Cyber Arms ControlReferences |
isbn |
1-282-39853-9 9786612398537 0-8330-4875-9 0-8330-4734-5 |
callnumber-first |
U - Military Science |
callnumber-subject |
U - General Military Science |
callnumber-label |
U163 |
callnumber-sort |
U 3163 L539 42009 |
geographic_facet |
United States. United States |
illustrated |
Not Illustrated |
dewey-hundreds |
300 - Social sciences |
dewey-tens |
360 - Social problems & social services |
dewey-ones |
363 - Other social problems & services |
dewey-full |
363.3250973 |
dewey-sort |
3363.3250973 |
dewey-raw |
363.3250973 |
dewey-search |
363.3250973 |
oclc_num |
559030468 |
work_keys_str_mv |
AT libickimartinc cyberdeterrenceandcyberwar AT projectairforceus cyberdeterrenceandcyberwar |
status_str |
n |
ids_txt_mv |
(CKB)2550000000005577 (EBL)475081 (OCoLC)559030468 (SSID)ssj0000336454 (PQKBManifestationID)11251861 (PQKBTitleCode)TC0000336454 (PQKBWorkID)10281871 (PQKB)11468542 (Au-PeEL)EBL475081 (CaPaEBR)ebr10354100 (Au-PeEL)EBL4970005 (CaONFJC)MIL239853 (MiAaPQ)EBC475081 (MiAaPQ)EBC4970005 (EXLCZ)992550000000005577 |
carrierType_str_mv |
cr |
is_hierarchy_title |
Cyberdeterrence and cyberwar / |
author2_original_writing_str_mv |
noLinkedField |
_version_ |
1806402863707979776 |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01166nam a2200313Ia 4500</leader><controlfield tag="001">993628515904498</controlfield><controlfield tag="005">20200520144314.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr -n---------</controlfield><controlfield tag="008">090722s2009 cau ob 000 0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1-282-39853-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786612398537</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0-8330-4875-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CKB)2550000000005577</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EBL)475081</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)559030468</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SSID)ssj0000336454</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBManifestationID)11251861</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBTitleCode)TC0000336454</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKBWorkID)10281871</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(PQKB)11468542</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL475081</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaPaEBR)ebr10354100</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL4970005</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaONFJC)MIL239853</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC475081</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)EBC4970005</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(EXLCZ)992550000000005577</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">U163</subfield><subfield code="b">.L539 2009</subfield></datafield><datafield tag="082" ind1="0" ind2="0"><subfield code="a">363.3250973</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberdeterrence and cyberwar /</subfield><subfield code="c">Martin C. Libicki.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Santa Monica, CA :</subfield><subfield code="b">RAND,</subfield><subfield code="c">2009.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (239 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover; Preface; Contents; Figures; Tables; Summary; Acknowledgements; Abbreviations; CHAPTER ONE - Introduction; CHAPTER TWO - A Conceptual Framework; CHAPTER THREE - Why Cyberdeterrence Is Different; CHAPTER FOUR - Why the Purpose of the Original CyberattackMatters; CHAPTER FIVE - A Strategy of Response; CHAPTER SIX - Strategic Cyberwar; CHAPTER SEVEN - Operational Cyberwar; CHAPTER EIGHT - Cyberdefense; CHAPTER NINE - Tricky Terrain; APPENDIX A - What Constitutes an Act of War in Cyberspace?; APPENDIX B - The Calculus of Explicit Versus Implicit Deterrence</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">APPENDIX C - The Dim Prospects for Cyber Arms ControlReferences</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Civil defense</subfield><subfield code="z">United States.</subfield></datafield><datafield tag="776" ind1=" " ind2=" "><subfield code="z">0-8330-4734-5</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Project Air Force (U.S.)</subfield></datafield><datafield tag="906" ind1=" " ind2=" "><subfield code="a">BOOK</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="p">$33.50</subfield><subfield code="u">10/27/2014</subfield><subfield code="5">Hist</subfield></datafield><datafield tag="ADM" ind1=" " ind2=" "><subfield code="b">2024-08-03 22:26:33 Europe/Vienna</subfield><subfield code="f">system</subfield><subfield code="c">marc21</subfield><subfield code="a">2012-02-25 22:41:52 Europe/Vienna</subfield><subfield code="g">false</subfield></datafield><datafield tag="AVE" ind1=" " ind2=" "><subfield code="i">DOAB Directory of Open Access Books</subfield><subfield code="P">DOAB Directory of Open Access Books</subfield><subfield code="x">https://eu02.alma.exlibrisgroup.com/view/uresolver/43ACC_OEAW/openurl?u.ignore_date_coverage=true&portfolio_pid=5350513160004498&Force_direct=true</subfield><subfield code="Z">5350513160004498</subfield><subfield code="b">Available</subfield><subfield code="8">5350513160004498</subfield></datafield></record></collection> |