000 | 03771cam a2200397Ii 4500 | ||
---|---|---|---|
001 | ocn870988077 | ||
003 | OCoLC | ||
005 | 20240726105307.0 | ||
008 | 130811s2012 dcua eob 001 0 eng | ||
040 |
_aAU@ _beng _erda _epn _cAU@ _dOCLCO _dOCLCQ _dOCLCF _dCUS _dYDXCP _dMHW _dE7B _dNT _dEBLCP _dUBY _dJSTOR _dDEBSZ _dD6H _dNHM |
||
020 |
_a9781589019195 _q((electronic)l(electronic)ctronic) |
||
050 | 0 | 4 |
_aHV6773 _b.C934 2012 |
050 | 0 | 4 | _aHV6773 |
049 | _aMAIN | ||
245 | 1 | 0 |
_aCyberspace and national security : _bthreats, opportunities, and power in a virtual world / _cDerek S. Reveron, editor. |
260 |
_aWashington DC : _bGeorgetown University Press, _c(c)2012. |
||
300 |
_a1 online resource (ix, 246 pages) : _billustration |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_adata file _2rda |
||
504 | _a2 | ||
520 | 0 | _aIn a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social space, and a new economic sphere that are intertwined with our everyday lives. At the same time, individuals, subnational groups, and governments are using cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the vast majority of cyberspace is civilian space used by individuals, businesses, and governments for legitimate purposes. | |
520 | 0 | _aScholars, policy analysts, and information technology executives consider current and future cyber threats. They discuss various strategies to advance and defend national interests in cyberspace, contrast the US approach with European and Chinese views, and posit a way of using cyber capabilities in war. Fundamentally, this book establishes a coherent framework to help strategists and policymakers understand the ways in which cyberspace has become a critical new domain for national security. | |
505 | 0 | 0 |
_aPart 1. Thinking about cyber. An introduction to national security and cyberspace / _rDerek S. Reveron ; Speculative security / _rPatrick Jagoda ; Operational considerations in cyber attack and cyber exploitation / _rHerbert Lin ; Joining cybercrime and cyberterrorism: a likely scenario / _rSteven Bucci -- _tpart 2. Armed conflict and cyber defense. Inter arma silent leges Redux? The law of armed conflict and cyber conflict / _rDavid P. Fidler ; The emerging structure of strategic cyber offense, cyber defense, and cyber deterrence / _rRichard B. Andres ; A new framework for cyberdeterrence / _rJeffrey R. Cooper ; Cybered conflict, cyber power, and security resilience as strategy / _rChris Demchak -- _tpart 3. National approaches to cybersecurity and cyberwar. Persistent enemies and cyberwar: rivalry relations in an age of information warfare / _rBrandon Valeriano and Ryan Maness ; Competing Transatlantic Visions of Cybersecurity / _rJames Joyner ; The bear goes digital: Russia and its cyber capabilities / _rNikolas K. Gvosdev ; China in cyberspace / _rNigel Inkster ; Toward a theory of cyber power: strategic purpose in peace and war / _rJohn B. Sheldon -- _tConclusion / _rDerek S. Reveron. |
530 |
_a2 _ub |
||
650 | 0 | _aConflict management. | |
650 | 0 | _aCyberterrorism. | |
650 | 0 | _aNational security. | |
655 | 1 | _aElectronic Books. | |
700 | 1 |
_aReveron, Derek S., _e5 |
|
856 | 4 | 0 |
_uhttps://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=491171&site=eds-live&custid=s3260518 _zClick to access digital title | log in using your CIU ID number and my.ciu.edu password |
942 |
_cOB _D _eEB _hHV.. _m2012 _QOL _R _x _8NFIC _2LOC |
||
994 |
_a92 _bNT |
||
999 |
_c95475 _d95475 |
||
902 |
_a1 _bCynthia Snell _c1 _dCynthia Snell |