|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn804664864 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr un||||||||| |
008 |
120806s2012 enk ob 001 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCO
|d MHW
|d YDXCP
|d IDEBK
|d AU@
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d UKBOL
|d OCLCO
|d OCLCF
|d AUD
|d N15
|d OCLCQ
|d OCLCO
|d OCLCQ
|d WNC
|d OCLCQ
|d UEJ
|d UAB
|d OCLCQ
|d LOA
|d CUY
|d MERUC
|d ZCU
|d ICG
|d OCLCQ
|d WYU
|d LVT
|d TKN
|d DKC
|d OCLCQ
|d UKAHL
|d OCLCQ
|d EQK
|d OCLCQ
|d MM9
|d LUN
|d OCLCQ
|d OCLCO
|d OCLCQ
|d VI#
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 812997615
|a 826453789
|a 1170797473
|a 1170911123
|a 1170978890
|
020 |
|
|
|a 9781139528313
|
020 |
|
|
|a 1139528319
|
020 |
|
|
|a 9781107011083
|q (print)
|
020 |
|
|
|a 1107011086
|q (print)
|
020 |
|
|
|a 9780511894527
|q (ebook)
|
020 |
|
|
|a 051189452X
|q (ebook)
|
020 |
|
|
|a 9781139525923
|
020 |
|
|
|a 1139525921
|
020 |
|
|
|a 9781107416994
|q (paperback)
|
020 |
|
|
|a 110741699X
|
020 |
|
|
|z 9781139530590
|
024 |
8 |
|
|a 9786613834447
|
029 |
1 |
|
|a AU@
|b 000050082869
|
029 |
1 |
|
|a AU@
|b 000055824244
|
029 |
1 |
|
|a DEBSZ
|b 397352271
|
035 |
|
|
|a (OCoLC)804664864
|z (OCoLC)812997615
|z (OCoLC)826453789
|z (OCoLC)1170797473
|z (OCoLC)1170911123
|z (OCoLC)1170978890
|
050 |
|
4 |
|a KZ6718 .D56 2012
|
082 |
0 |
4 |
|a 343.0999
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Harrison Dinniss, Heather.
|
245 |
1 |
0 |
|a Cyber Warfare and the Laws of War.
|
260 |
|
|
|a Cambridge :
|b Cambridge University Press,
|c 2012.
|
300 |
|
|
|a 1 online resource (360 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|2 rdaft
|
490 |
1 |
|
|a Cambridge Studies in International and Comparative Law ;
|v v. 92
|
505 |
0 |
|
|a Cover; Cyber Warfare and the Laws of War; Series; Title; Copyright; Dedication; Contents; Acknowledgements; Table of cases; List of abbreviations; 1: The world in which we live and fight; 1. Computer network attacks; 2. Law and war in the internet age; 3. Societal trends generally; 3.1. The information revolution and digitisation; 3.1.1. Ubiquity; 3.1.2. Amount; 3.1.3. Societal change; 3.1.4. Organisational change; 3.2. Globalisation, interdependency and the changing world order; 3.3. The rise of the knowledge economy; 4. Military trends; 4.1. A change of purpose.
|
505 |
8 |
|
|a 4.2. Network-centric warfare and effects-based operations4.3. Outsourcing and civilianisation; 5. Terminology and definitions; 5.1. New laws for old?; 5.2. Methodology; 5.3. A word about examples and hypotheticals; 6. Conclusion; PART I: Jus ad bellum; 2 Computer network attacks as a use of force in international law; 1. Force defined as armed force; The Charter wording; Travaux préparatoires and historical background; Subsequent iterations of the rule; 2. Definition of armed force; 2.1. State actions; 2.2. Theories of force -- scholastic writings; 3. Computer network attacks as a use of force.
|
505 |
8 |
|
|a 3.1. Characteristics of computer network attacks3.1.1. Indirectness; 3.1.2. Intangibility; Target intangibility; Weapons intangibility; 3.1.3. Locus; 3.1.4. Result; 4. Conclusion; 3 Armed attack and response in the digital age; 1. Armed attack; 1.1. Anticipatory self-defence; 1.1.1. Doctrinal debate and imminent attacks; 1.1.2. State practice; 1.1.3. Computer network attacks and anticipatory self-defence; 1.1.4. The 'Bush doctrine' of pre-emptive self-defence65; 1.2. Pinprick attacks or accumulation of events theory; 2. Self-defence against non-state actors; 3. Attribution.
|
505 |
8 |
|
|a 4. Necessity and proportionality5. Countermeasures against unlawful acts; 6. Security Council authorisation and collective measures; 7. Conclusion; PART II: Jus in bello; 4 The applicability of the laws of armed conflict to computer network attacks; 1. Armed conflict; 1.1. The requirement of armed force; 1.2. Intervention of the armed forces; 2. Application to computer network attacks; 2.1. Application during conventional armed conflict; 2.2. Computer network attack on its own; 2.2.1. Armed force; 2.2.2. Humanitarian principles; 2.3. Computer network attacks in support of conventional attacks.
|
505 |
8 |
|
|a 3. Territory4. Conclusion; 5 Participants in conflict: combatant status, direct participation and computer network attack; 1. Combatant status; 1.1. Requirements of combatant status; 1.1.1. Responsible command; 1.1.2. Distinction; 1.1.3. Compliance, organisation, belonging and allegiance; 1.2. Saboteurs and spies; 1.2.1. Sabotage; 1.2.2. Espionage; 2. Direct participation by civilians; 2.1. Requirements of direct participation; 2.1.1. Earlier scholarship; 2.1.2. The ICRC interpretive guidance; 2.2. Offensive computer network attack; 2.3. Computer network attack system support.
|
500 |
|
|
|a 2.4. Generic IT support.
|
520 |
|
|
|a An analysis of the status of computer network attacks in international law.
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Information warfare (International law)
|
650 |
|
0 |
|a War (International law)
|
650 |
|
0 |
|a Cyberterrorism.
|
650 |
|
6 |
|a Guerre de l'information (Droit international)
|
650 |
|
6 |
|a Guerre (Droit international)
|
650 |
|
6 |
|a Cyberterrorisme.
|
650 |
|
7 |
|a LAW
|x International.
|2 bisacsh
|
650 |
|
7 |
|a Cyberterrorism
|2 fast
|
650 |
|
7 |
|a Information warfare (International law)
|2 fast
|
650 |
|
7 |
|a War (International law)
|2 fast
|
758 |
|
|
|i has work:
|a Cyber warfare and the laws of war (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGMVWmddfjjM9b3Dxj9CcP
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Harrison Dinniss, Heather.
|t Cyber Warfare and the Laws of War.
|d Cambridge : Cambridge University Press, ©2012
|z 9781107011083
|
830 |
|
0 |
|a Cambridge studies in international and comparative law.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=977168
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH28321408
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33350664
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL977168
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 383444
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9454121
|
994 |
|
|
|a 92
|b IZTAP
|