|
|
|
|
LEADER |
02286nam a2200457 u 4500 |
001 |
EB001842517 |
003 |
EBX01000000000000001006506 |
005 |
00000000000000.0 |
007 |
tu||||||||||||||||||||| |
008 |
180730 r ||| eng |
020 |
|
|
|z 9780833047342
|
020 |
|
|
|a 9780833047342
|
020 |
|
|
|a 9781282398535
|
020 |
|
|
|a 9786612398537
|
020 |
|
|
|a 1282398539
|
020 |
|
|
|a 6612398531
|
020 |
|
|
|z 0833047345
|
020 |
|
|
|a 0833047345
|
050 |
|
4 |
|a U163
|
100 |
1 |
|
|a Libicki, Martin C.
|
245 |
0 |
0 |
|a Cyberdeterrence and cyberwar
|h Elektronische Ressource
|c Martin C. Libicki
|
260 |
|
|
|a Santa Monica, CA
|b RAND
|c 2009, 2009
|
300 |
|
|
|a xxiv, 214 pages
|b illustrations
|
505 |
0 |
|
|a Introduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dim prospects for cyber arms control
|
505 |
0 |
|
|a Includes bibliographical references (pages 225-214)
|
651 |
|
4 |
|a United States / fast
|
653 |
|
|
|a TECHNOLOGY / Military Science
|
653 |
|
|
|a COMPUTERS / Security / General
|
653 |
|
|
|a Civil defense / United States
|
653 |
|
|
|a POLITICAL SCIENCE / Political Freedom & Security / Terrorism
|
653 |
|
|
|a Cyberspace / Security measures
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b ZDB-39-JOA
|a JSTOR Open Access Books
|
490 |
0 |
|
|a RAND Corporation monograph series
|
024 |
8 |
|
|a RAND/MG-877-AF
|
773 |
0 |
|
|t Books at JSTOR: Open Access
|
776 |
|
|
|z 9780833048752
|
776 |
|
|
|z 0833048759
|
856 |
4 |
0 |
|u https://www.jstor.org/stable/10.7249/mg877af
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 355.3/43
|
520 |
|
|
|a Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack
|