Cyberdeterrence and cyberwar:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Santa Monica, CA
RAND
2009
|
Schriftenreihe: | Rand Corporation monograph series
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 Volltext |
Beschreibung: | "Prepared for the United States Air Force.". - "Rand Project Air Force." Includes bibliographical references (p. 225-214) Introduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dim prospects for cyber arms control Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack |
Beschreibung: | 1 Online-Ressource (xxiv, 214 p.) |
ISBN: | 0833047345 0833048759 9780833047342 9780833048752 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043149736 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 151126s2009 |||| o||u| ||||||eng d | ||
020 | |a 0833047345 |9 0-8330-4734-5 | ||
020 | |a 0833048759 |c electronic bk. |9 0-8330-4875-9 | ||
020 | |a 9780833047342 |9 978-0-8330-4734-2 | ||
020 | |a 9780833048752 |c electronic bk. |9 978-0-8330-4875-2 | ||
027 | |a RAND/MG-877-AF | ||
035 | |a (OCoLC)559030468 | ||
035 | |a (DE-599)BVBBV043149736 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 355.3/43 |2 22 | |
100 | 1 | |a Libicki, Martin C. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Cyberdeterrence and cyberwar |c Martin C. Libicki |
264 | 1 | |a Santa Monica, CA |b RAND |c 2009 | |
300 | |a 1 Online-Ressource (xxiv, 214 p.) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Rand Corporation monograph series | |
500 | |a "Prepared for the United States Air Force.". - "Rand Project Air Force." | ||
500 | |a Includes bibliographical references (p. 225-214) | ||
500 | |a Introduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dim prospects for cyber arms control | ||
500 | |a Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack | ||
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a POLITICAL SCIENCE / Political Freedom & Security / Terrorism |2 bisacsh | |
650 | 7 | |a TECHNOLOGY / Military Science |2 bisacsh | |
650 | 4 | |a Terrorismus | |
650 | 4 | |a Information warfare |z United States | |
650 | 4 | |a Cyberterrorism |z United States |x Prevention | |
650 | 4 | |a Cyberspace |x Security measures | |
650 | 4 | |a Computer networks |x Security measures |z United States | |
650 | 4 | |a Civil defense |z United States | |
651 | 4 | |a USA | |
710 | 2 | |a Project Air Force (U.S.) |e Sonstige |4 oth | |
856 | 4 | 0 | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304894 |x Aggregator |3 Volltext |
912 | |a ZDB-4-EBA | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-028573926 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304894 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304894 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804175607934746624 |
---|---|
any_adam_object | |
author | Libicki, Martin C. |
author_facet | Libicki, Martin C. |
author_role | aut |
author_sort | Libicki, Martin C. |
author_variant | m c l mc mcl |
building | Verbundindex |
bvnumber | BV043149736 |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)559030468 (DE-599)BVBBV043149736 |
dewey-full | 355.3/43 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.3/43 |
dewey-search | 355.3/43 |
dewey-sort | 3355.3 243 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03081nmm a2200553zc 4500</leader><controlfield tag="001">BV043149736</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">151126s2009 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833047345</subfield><subfield code="9">0-8330-4734-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0833048759</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-8330-4875-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833047342</subfield><subfield code="9">978-0-8330-4734-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780833048752</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-8330-4875-2</subfield></datafield><datafield tag="027" ind1=" " ind2=" "><subfield code="a">RAND/MG-877-AF</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)559030468</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043149736</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.3/43</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Libicki, Martin C.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyberdeterrence and cyberwar</subfield><subfield code="c">Martin C. Libicki</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Santa Monica, CA</subfield><subfield code="b">RAND</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxiv, 214 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Rand Corporation monograph series</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Prepared for the United States Air Force.". - "Rand Project Air Force."</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references (p. 225-214)</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Introduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dim prospects for cyber arms control</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Political Freedom & Security / Terrorism</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY / Military Science</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Terrorismus</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="z">United States</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Civil defense</subfield><subfield code="z">United States</subfield></datafield><datafield tag="651" ind1=" " ind2="4"><subfield code="a">USA</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Project Air Force (U.S.)</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304894</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-028573926</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304894</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304894</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
geographic | USA |
geographic_facet | USA |
id | DE-604.BV043149736 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:18:59Z |
institution | BVB |
isbn | 0833047345 0833048759 9780833047342 9780833048752 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-028573926 |
oclc_num | 559030468 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
physical | 1 Online-Ressource (xxiv, 214 p.) |
psigel | ZDB-4-EBA ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | RAND |
record_format | marc |
series2 | Rand Corporation monograph series |
spelling | Libicki, Martin C. Verfasser aut Cyberdeterrence and cyberwar Martin C. Libicki Santa Monica, CA RAND 2009 1 Online-Ressource (xxiv, 214 p.) txt rdacontent c rdamedia cr rdacarrier Rand Corporation monograph series "Prepared for the United States Air Force.". - "Rand Project Air Force." Includes bibliographical references (p. 225-214) Introduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dim prospects for cyber arms control Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack COMPUTERS / Security / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh TECHNOLOGY / Military Science bisacsh Terrorismus Information warfare United States Cyberterrorism United States Prevention Cyberspace Security measures Computer networks Security measures United States Civil defense United States USA Project Air Force (U.S.) Sonstige oth http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304894 Aggregator Volltext |
spellingShingle | Libicki, Martin C. Cyberdeterrence and cyberwar COMPUTERS / Security / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh TECHNOLOGY / Military Science bisacsh Terrorismus Information warfare United States Cyberterrorism United States Prevention Cyberspace Security measures Computer networks Security measures United States Civil defense United States |
title | Cyberdeterrence and cyberwar |
title_auth | Cyberdeterrence and cyberwar |
title_exact_search | Cyberdeterrence and cyberwar |
title_full | Cyberdeterrence and cyberwar Martin C. Libicki |
title_fullStr | Cyberdeterrence and cyberwar Martin C. Libicki |
title_full_unstemmed | Cyberdeterrence and cyberwar Martin C. Libicki |
title_short | Cyberdeterrence and cyberwar |
title_sort | cyberdeterrence and cyberwar |
topic | COMPUTERS / Security / General bisacsh POLITICAL SCIENCE / Political Freedom & Security / Terrorism bisacsh TECHNOLOGY / Military Science bisacsh Terrorismus Information warfare United States Cyberterrorism United States Prevention Cyberspace Security measures Computer networks Security measures United States Civil defense United States |
topic_facet | COMPUTERS / Security / General POLITICAL SCIENCE / Political Freedom & Security / Terrorism TECHNOLOGY / Military Science Terrorismus Information warfare United States Cyberterrorism United States Prevention Cyberspace Security measures Computer networks Security measures United States Civil defense United States USA |
url | http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=304894 |
work_keys_str_mv | AT libickimartinc cyberdeterrenceandcyberwar AT projectairforceus cyberdeterrenceandcyberwar |