Check nearby libraries
Buy this book

Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
Check nearby libraries
Buy this book

Subjects
Security measures, Cyberterrorism, Cyberspace, Information warfare, Computer networks, Civil defense, PreventionPlaces
United StatesEdition | Availability |
---|---|
1 |
zzzz
|
2 |
zzzz
|
3 |
aaaa
|
Book Details
Table of Contents
Introduction
A conceptual framework
Why cyberdeterrence is different
Why the purpose of the original cyberattack matters
A strategy of response
Strategic cyberwar
Operational cyberwar
Cyberdefense
Tricky terrain
Appendixes: A. What constitutes an act of war in cyberspace?
B. The calculus of explicit versus implicit deterrence
C. The dim prospects for cyber arms control.
Edition Notes
"Prepared for the United States Air Force."
"Rand Project Air Force."
Includes bibliographical references.
Classifications
The Physical Object
Edition Identifiers
Work Identifiers
Community Reviews (0)
History
- Created March 26, 2010
- 2 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
July 31, 2019 | Edited by MARC Bot | associate edition with work OL2664223W |
March 26, 2010 | Created by ImportBot | Imported from Library of Congress MARC record |