Check nearby libraries
Buy this book
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
Check nearby libraries
Buy this book
Previews available in: English
Edition | Availability |
---|---|
1 |
aaaa
Libraries near you:
WorldCat
|
Book Details
Published in
Santa Monica, CA
Table of Contents
Edition Notes
"Prepared for the United States Air Force."
"Rand Project Air Force."
Includes bibliographical references.
Classifications
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?History
- Created March 2, 2010
- 9 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
December 20, 2023 | Edited by ImportBot | import existing book |
January 14, 2023 | Edited by ImportBot | import existing book |
January 1, 2023 | Edited by MARC Bot | import existing book |
December 14, 2022 | Edited by CoverBot | //covers.openlibrary.org/b/id/13081677-S.jpg |
March 2, 2010 | Created by ImportBot | Imported from Library of Congress MARC record. |