000 03771cam a2200397Ii 4500
001 ocn870988077
003 OCoLC
005 20240726105307.0
008 130811s2012 dcua eob 001 0 eng
040 _aAU@
_beng
_erda
_epn
_cAU@
_dOCLCO
_dOCLCQ
_dOCLCF
_dCUS
_dYDXCP
_dMHW
_dE7B
_dNT
_dEBLCP
_dUBY
_dJSTOR
_dDEBSZ
_dD6H
_dNHM
020 _a9781589019195
_q((electronic)l(electronic)ctronic)
050 0 4 _aHV6773
_b.C934 2012
050 0 4 _aHV6773
049 _aMAIN
245 1 0 _aCyberspace and national security :
_bthreats, opportunities, and power in a virtual world /
_cDerek S. Reveron, editor.
260 _aWashington DC :
_bGeorgetown University Press,
_c(c)2012.
300 _a1 online resource (ix, 246 pages) :
_billustration
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _adata file
_2rda
504 _a2
520 0 _aIn a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social space, and a new economic sphere that are intertwined with our everyday lives. At the same time, individuals, subnational groups, and governments are using cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the vast majority of cyberspace is civilian space used by individuals, businesses, and governments for legitimate purposes.
520 0 _aScholars, policy analysts, and information technology executives consider current and future cyber threats. They discuss various strategies to advance and defend national interests in cyberspace, contrast the US approach with European and Chinese views, and posit a way of using cyber capabilities in war. Fundamentally, this book establishes a coherent framework to help strategists and policymakers understand the ways in which cyberspace has become a critical new domain for national security.
505 0 0 _aPart 1. Thinking about cyber. An introduction to national security and cyberspace /
_rDerek S. Reveron ; Speculative security /
_rPatrick Jagoda ; Operational considerations in cyber attack and cyber exploitation /
_rHerbert Lin ; Joining cybercrime and cyberterrorism: a likely scenario /
_rSteven Bucci --
_tpart 2. Armed conflict and cyber defense. Inter arma silent leges Redux? The law of armed conflict and cyber conflict /
_rDavid P. Fidler ; The emerging structure of strategic cyber offense, cyber defense, and cyber deterrence /
_rRichard B. Andres ; A new framework for cyberdeterrence /
_rJeffrey R. Cooper ; Cybered conflict, cyber power, and security resilience as strategy /
_rChris Demchak --
_tpart 3. National approaches to cybersecurity and cyberwar. Persistent enemies and cyberwar: rivalry relations in an age of information warfare /
_rBrandon Valeriano and Ryan Maness ; Competing Transatlantic Visions of Cybersecurity /
_rJames Joyner ; The bear goes digital: Russia and its cyber capabilities /
_rNikolas K. Gvosdev ; China in cyberspace /
_rNigel Inkster ; Toward a theory of cyber power: strategic purpose in peace and war /
_rJohn B. Sheldon --
_tConclusion /
_rDerek S. Reveron.
530 _a2
_ub
650 0 _aConflict management.
650 0 _aCyberterrorism.
650 0 _aNational security.
655 1 _aElectronic Books.
700 1 _aReveron, Derek S.,
_e5
856 4 0 _uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=491171&site=eds-live&custid=s3260518
_zClick to access digital title | log in using your CIU ID number and my.ciu.edu password
942 _cOB
_D
_eEB
_hHV..
_m2012
_QOL
_R
_x
_8NFIC
_2LOC
994 _a92
_bNT
999 _c95475
_d95475
902 _a1
_bCynthia Snell
_c1
_dCynthia Snell