Check nearby libraries
Buy this book
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
Check nearby libraries
Buy this book
Previews available in: English
Subjects
Security measures, Cyberterrorism, Cyberspace, Information warfare, Computer networks, Civil defense, PreventionPlaces
United StatesShowing 3 featured editions. View all 3 editions?
Edition | Availability |
---|---|
1 |
zzzz
Libraries near you:
WorldCat
|
2 |
zzzz
Libraries near you:
WorldCat
|
3 |
aaaa
Libraries near you:
WorldCat
|
Book Details
Table of Contents
Edition Notes
"Prepared for the United States Air Force."
"Rand Project Air Force."
Includes bibliographical references.
Classifications
The Physical Object
ID Numbers
Community Reviews (0)
Feedback?History
- Created March 26, 2010
- 2 revisions
Wikipedia citation
×CloseCopy and paste this code into your Wikipedia page. Need help?
July 31, 2019 | Edited by MARC Bot | associate edition with work OL2664223W |
March 26, 2010 | Created by ImportBot | Imported from Library of Congress MARC record |