Record ID | harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:847697890:1549 |
Source | harvard_bibliographic_metadata |
Download Link | /show-records/harvard_bibliographic_metadata/ab.bib.13.20150123.full.mrc:847697890:1549?format=raw |
LEADER: 01549cam a2200325 a 4500
001 013764681-X
005 20140807112921.0
008 120829t20142014nyua b 001 0 eng
010 $a 2012035324
016 7 $a016176518$2Uk
020 $a9781107004375 (hbk)
020 $a1107004373 (hbk)
035 $a(PromptCat)99954865408
035 0 $aocn808990400
040 $aDLC$beng$cDLC$dYDX$dUKMGB$dBTCTA$dRCJ$dYDXCP
050 00 $aKZ6718$b.S53 2014
082 00 $a343.09/99$223
100 1 $aShackelford, Scott J.
245 10 $aManaging cyber attacks in international law, business, and relations :$bin search of cyber peace /$cScott J. Shackelford.
260 $aNew York, N.Y. :$bCambridge University Press,$c2014.
300 $axxxix, 393 p. :$bill. ;$c24 cm.
504 $aIncludes bibliographical references and index.
505 00 $tDefining the cyber threat in internet governance --$tWho controls cyberspace? Analyzing cyber regulation through polycentric governance --$tHacking the planet, the Dalai Lama, and you : managing technical vulnerabilities in the internet --$tThe new cyber warfare : securing critical national infrastructure in the digital age --$tRisky business : enhancing private-sector cybersecurity --$tAn introduction to the law of cyber war and peace --$tCyber peace.
650 0 $aInformation warfare (International law)
650 0 $aCyberspace$xSecurity measures.
650 0 $aCyberterrorism.
650 0 $aComputer crimes.
650 0 $aComputer networks$xSecurity measures.
988 $a20130824
906 $0DLC