Computer network attack and the use of force in international law: thoughts on normative framework
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Colorado Springs, Colo.
IITA
1999
|
Schriftenreihe: | Institute for Information Technology Applications <Colorado Springs, Colo.>: IITA research publication
1 |
Schlagworte: | |
Beschreibung: | VIII, 61 S. |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV013266281 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | t | ||
008 | 000725s1999 |||| 00||| eng d | ||
035 | |a (OCoLC)43746388 | ||
035 | |a (DE-599)BVBBV013266281 | ||
040 | |a DE-604 |b ger |e rakwb | ||
041 | 0 | |a eng | |
049 | |a DE-19 | ||
050 | 0 | |a TK5105.59 | |
100 | 1 | |a Schmitt, Michael N. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Computer network attack and the use of force in international law |b thoughts on normative framework |c Michael N. Schmitt |
264 | 1 | |a Colorado Springs, Colo. |b IITA |c 1999 | |
300 | |a VIII, 61 S. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Institute for Information Technology Applications <Colorado Springs, Colo.>: IITA research publication |v 1 | |
650 | 4 | |a Politik | |
650 | 4 | |a Recht | |
650 | 4 | |a Computer networks |x Security measures |z United States | |
650 | 4 | |a Computer security |x Government policy |z United States | |
650 | 4 | |a Computers |x Law and legislation | |
650 | 4 | |a Internet |x Security measures |z United States | |
650 | 4 | |a Telecommunication policy |z United States | |
651 | 4 | |a USA | |
830 | 0 | |a Institute for Information Technology Applications <Colorado Springs, Colo.>: IITA research publication |v 1 |w (DE-604)BV013266236 |9 1 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-009044109 |
Datensatz im Suchindex
_version_ | 1804128032003194880 |
---|---|
any_adam_object | |
author | Schmitt, Michael N. |
author_facet | Schmitt, Michael N. |
author_role | aut |
author_sort | Schmitt, Michael N. |
author_variant | m n s mn mns |
building | Verbundindex |
bvnumber | BV013266281 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
ctrlnum | (OCoLC)43746388 (DE-599)BVBBV013266281 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01382nam a2200373 cb4500</leader><controlfield tag="001">BV013266281</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">000725s1999 |||| 00||| eng d</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)43746388</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV013266281</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Schmitt, Michael N.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Computer network attack and the use of force in international law</subfield><subfield code="b">thoughts on normative framework</subfield><subfield code="c">Michael N. Schmitt</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Colorado Springs, Colo.</subfield><subfield code="b">IITA</subfield><subfield code="c">1999</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">VIII, 61 S.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Institute for Information Technology Applications <Colorado Springs, Colo.>: IITA research publication</subfield><subfield code="v">1</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Politik</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Recht</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Government policy</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Law and legislation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Telecommunication policy</subfield><subfield code="z">United States</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Institute for Information Technology Applications <Colorado Springs, Colo.>: IITA research publication</subfield><subfield code="v">1</subfield><subfield code="w">(DE-604)BV013266236</subfield><subfield code="9">1</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-009044109</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV013266281 |
illustrated | Not Illustrated |
indexdate | 2024-07-09T18:42:47Z |
institution | BVB |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-009044109 |
oclc_num | 43746388 |
open_access_boolean | |
owner | DE-19 DE-BY-UBM |
owner_facet | DE-19 DE-BY-UBM |
physical | VIII, 61 S. |
publishDate | 1999 |
publishDateSearch | 1999 |
publishDateSort | 1999 |
publisher | IITA |
record_format | marc |
series | Institute for Information Technology Applications <Colorado Springs, Colo.>: IITA research publication |
series2 | Institute for Information Technology Applications <Colorado Springs, Colo.>: IITA research publication |
spelling | Schmitt, Michael N. Verfasser aut Computer network attack and the use of force in international law thoughts on normative framework Michael N. Schmitt Colorado Springs, Colo. IITA 1999 VIII, 61 S. txt rdacontent n rdamedia nc rdacarrier Institute for Information Technology Applications <Colorado Springs, Colo.>: IITA research publication 1 Politik Recht Computer networks Security measures United States Computer security Government policy United States Computers Law and legislation Internet Security measures United States Telecommunication policy United States USA Institute for Information Technology Applications <Colorado Springs, Colo.>: IITA research publication 1 (DE-604)BV013266236 1 |
spellingShingle | Schmitt, Michael N. Computer network attack and the use of force in international law thoughts on normative framework Institute for Information Technology Applications <Colorado Springs, Colo.>: IITA research publication Politik Recht Computer networks Security measures United States Computer security Government policy United States Computers Law and legislation Internet Security measures United States Telecommunication policy United States |
title | Computer network attack and the use of force in international law thoughts on normative framework |
title_auth | Computer network attack and the use of force in international law thoughts on normative framework |
title_exact_search | Computer network attack and the use of force in international law thoughts on normative framework |
title_full | Computer network attack and the use of force in international law thoughts on normative framework Michael N. Schmitt |
title_fullStr | Computer network attack and the use of force in international law thoughts on normative framework Michael N. Schmitt |
title_full_unstemmed | Computer network attack and the use of force in international law thoughts on normative framework Michael N. Schmitt |
title_short | Computer network attack and the use of force in international law |
title_sort | computer network attack and the use of force in international law thoughts on normative framework |
title_sub | thoughts on normative framework |
topic | Politik Recht Computer networks Security measures United States Computer security Government policy United States Computers Law and legislation Internet Security measures United States Telecommunication policy United States |
topic_facet | Politik Recht Computer networks Security measures United States Computer security Government policy United States Computers Law and legislation Internet Security measures United States Telecommunication policy United States USA |
volume_link | (DE-604)BV013266236 |
work_keys_str_mv | AT schmittmichaeln computernetworkattackandtheuseofforceininternationallawthoughtsonnormativeframework |