Record ID | ia:cyberoperationsu0000rosc |
Source | Internet Archive |
Download MARC XML | https://archive.org/download/cyberoperationsu0000rosc/cyberoperationsu0000rosc_marc.xml |
Download MARC binary | https://www.archive.org/download/cyberoperationsu0000rosc/cyberoperationsu0000rosc_meta.mrc |
LEADER: 01531cam 2200373 i 4500
001 9925181509701661
005 20150423154743.0
008 131023s2014 enk b 001 0 eng c
010 $a 2013953298
019 $a861207444$a878429747
020 $a9780199655014
020 $a0199655014 (cloth)
035 $a(OCoLC)874102682$z(OCoLC)861207444
035 $a(OCoLC)ocn874102682
040 $aCDX$beng$erda$cCDX$dDLC$dYDXCP$dBTCTA$dBDX$dGUL$dDEBBG$dRCJ$dCHVBK$dCLU$dOCLCF$dKIJ$dUKMGB
042 $apcc
050 00 $aK564.C6$bR67 2014
082 4 $a345.0$b23
100 1 $aRoscini, Marco.
245 10 $aCyber operations and the use of force in international law /$cMarco Roscini.
264 1 $aOxford :$bOxford University Press,$c2014.
300 $axxviii, 307 pages ;$c24 cm
336 $atext$2rdacontent
337 $aunmediated$2rdamedia
338 $avolume$2rdacarrier
500 $a"The Leverhulme Trust."
504 $aIncludes bibliographical references (pages 289-300) and index.
505 00 $tIdentifying the problem and the applicable law --$tCyber operations and the jus ad bellum --$tThe applicability of the jus in bello to cyber operations --$tCyber operations and the conduct of hostilities --$tCyber operations and the law of neutrality.
650 0 $aInternet$xLaw and legislation.
650 0 $aComputers$xLaw and legislation.
650 0 $aComputer crimes.
710 2 $aLeverhulme Trust.
947 $cBOOK$fBOOK-SETC-CS$g125.00$hCIRCSTACKS$iaa/cn$lNULS$o20141211$q1
980 $a99961014205