|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_ocn870988077 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr bnu---unuuu |
008 |
130811s2012 dcua eob 001 0 eng |
040 |
|
|
|a AU@
|b eng
|e rda
|e pn
|c AU@
|d OCLCO
|d OCLCQ
|d OCLCF
|d CUS
|d YDXCP
|d MHW
|d E7B
|d N$T
|d EBLCP
|d UBY
|d JSTOR
|d DEBSZ
|d D6H
|d NHM
|d JBG
|d AGLDB
|d YDX
|d NRC
|d MERUC
|d SAV
|d IOG
|d UUM
|d OCLCQ
|d VTS
|d RRP
|d INT
|d OCLCQ
|d OCLCO
|d OCLCA
|d LVT
|d OCLCQ
|d STF
|d M8D
|d OCLCA
|d OCLCQ
|d MM9
|d OCLCO
|d OCLCQ
|d UKAHL
|d NLSHB
|
019 |
|
|
|a 811206322
|a 980575256
|a 1043190081
|
020 |
|
|
|a 9781589019195
|q (electronic book)
|
020 |
|
|
|a 1589019199
|q (electronic book)
|
020 |
|
|
|z 9781589019188
|q (pbk. ;
|q alk. paper)
|
020 |
|
|
|z 1589019180
|q (pbk. ;
|q alk. paper)
|
024 |
8 |
|
|a 40021454200
|
029 |
0 |
|
|a AU@
|b 000052555463
|
029 |
1 |
|
|a AU@
|b 000058381269
|
029 |
1 |
|
|a AU@
|b 000069984076
|
029 |
1 |
|
|a DEBBG
|b BV043039063
|
029 |
1 |
|
|a DEBSZ
|b 421330678
|
029 |
1 |
|
|a DEBSZ
|b 43122501X
|
029 |
1 |
|
|a GBVCP
|b 1003759114
|
029 |
1 |
|
|a NZ1
|b 15968490
|
035 |
|
|
|a (OCoLC)870988077
|z (OCoLC)811206322
|z (OCoLC)980575256
|z (OCoLC)1043190081
|
037 |
|
|
|a 22573/ctt2pcgs4
|b JSTOR
|
050 |
|
4 |
|a HV6773.15.C97
|b C93 2012e
|
050 |
|
4 |
|a HV6773.15 .C97 C93 2012
|
072 |
|
7 |
|a HIS
|x 027130
|2 bisacsh
|
072 |
|
7 |
|a TEC
|x 025000
|2 bisacsh
|
072 |
|
7 |
|a POL036000
|2 bisacsh
|
082 |
0 |
4 |
|a 355.030285
|2 23
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Cyberspace and national security :
|b threats, opportunities, and power in a virtual world /
|c Derek S. Reveron, editor.
|
264 |
|
1 |
|a Washington DC :
|b Georgetown University Press,
|c [2012]
|
300 |
|
|
|a 1 online resource (ix, 246 pages) :
|b illustration
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
588 |
0 |
|
|a Online resource; title from digital title page (JSTOR platform, viewed January 11, 2017).
|
520 |
|
|
|a In a very short time, individuals and companies have harnessed cyberspace to create new industries, a vibrant social space, and a new economic sphere that are intertwined with our everyday lives. At the same time, individuals, subnational groups, and governments are using cyberspace to advance interests through malicious activity. Terrorists recruit, train, and target through the Internet, hackers steal data, and intelligence services conduct espionage. Still, the vast majority of cyberspace is civilian space used by individuals, businesses, and governments for legitimate purposes.
|
520 |
|
|
|a Scholars, policy analysts, and information technology executives consider current and future cyber threats. They discuss various strategies to advance and defend national interests in cyberspace, contrast the US approach with European and Chinese views, and posit a way of using cyber capabilities in war. Fundamentally, this book establishes a coherent framework to help strategists and policymakers understand the ways in which cyberspace has become a critical new domain for national security.
|
505 |
0 |
|
|a Part 1. Thinking about cyber. An introduction to national security and cyberspace / Derek S. Reveron ; Speculative security / Patrick Jagoda ; Operational considerations in cyber attack and cyber exploitation / Herbert Lin ; Joining cybercrime and cyberterrorism: a likely scenario / Steven Bucci -- part 2. Armed conflict and cyber defense. Inter arma silent leges Redux? The law of armed conflict and cyber conflict / David P. Fidler ; The emerging structure of strategic cyber offense, cyber defense, and cyber deterrence / Richard B. Andres ; A new framework for cyberdeterrence / Jeffrey R. Cooper ; Cybered conflict, cyber power, and security resilience as strategy / Chris Demchak -- part 3. National approaches to cybersecurity and cyberwar. Persistent enemies and cyberwar: rivalry relations in an age of information warfare / Brandon Valeriano and Ryan Maness ; Competing Transatlantic Visions of Cybersecurity / James Joyner ; The bear goes digital: Russia and its cyber capabilities / Nikolas K. Gvosdev ; China in cyberspace / Nigel Inkster ; Toward a theory of cyber power: strategic purpose in peace and war / John B. Sheldon -- Conclusion / Derek S. Reveron.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Conflict management.
|
650 |
|
0 |
|a Cyberterrorism.
|
650 |
|
0 |
|a National security.
|
650 |
|
6 |
|a Gestion des conflits.
|
650 |
|
6 |
|a Cyberterrorisme.
|
650 |
|
7 |
|a HISTORY
|x Military
|x Other.
|2 bisacsh
|
650 |
|
7 |
|a TECHNOLOGY & ENGINEERING
|x Military Science.
|2 bisacsh
|
650 |
|
7 |
|a POLITICAL SCIENCE
|x Intelligence & Espionage.
|2 bisacsh
|
650 |
|
7 |
|a Conflict management
|2 fast
|
650 |
|
7 |
|a Cyberterrorism
|2 fast
|
650 |
|
7 |
|a National security
|2 fast
|
650 |
|
7 |
|a Internet
|2 gnd
|
650 |
|
7 |
|a Sicherheitspolitik
|2 gnd
|
650 |
|
7 |
|a Terrorismus
|2 gnd
|
650 |
|
7 |
|a Information warfare
|2 gnd
|
650 |
|
7 |
|a Bewaffneter Konflikt
|2 gnd
|
650 |
|
7 |
|a Nationale veiligheid.
|2 nbdbt
|
650 |
|
7 |
|a Cyber terrorisme.
|2 nbdbt
|
650 |
|
7 |
|a Cyberterrorism.
|2 sao
|
650 |
|
7 |
|a Säkerhetspolitik.
|2 sao
|
700 |
1 |
|
|a Reveron, Derek S.,
|e editor.
|
776 |
0 |
8 |
|i Print version:
|t Cyberspace and national security.
|d Washington, DC : Georgetown University Press, ©2012
|z 9781589019188
|w (DLC) 2011051019
|w (OCoLC)769871204
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt2tt6rz
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH25466667
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL1029588
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10604650
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 491171
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 9700642
|
994 |
|
|
|a 92
|b IZTAP
|