Proceedings of a workshop on deterring cyberattacks: informing strategies and developing options for U.S. policy = Deterring cyberattacks
Gespeichert in:
Format: | Elektronisch E-Book |
---|---|
Sprache: | English |
Veröffentlicht: |
Washington, D.C.
National Academies Press
[2010], 2010
|
Schlagworte: | |
Beschreibung: | "Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop."--Publisher's Web site Print version record |
Beschreibung: | 1 online resource (xii, 388 pages) |
ISBN: | 9780309160865 0309160863 1282885774 9781282885776 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045348976 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2010 |||| o||u| ||||||eng d | ||
020 | |a 9780309160865 |9 978-0-309-16086-5 | ||
020 | |a 0309160863 |9 0-309-16086-3 | ||
020 | |a 1282885774 |9 1-282-88577-4 | ||
020 | |a 9781282885776 |9 978-1-282-88577-6 | ||
035 | |a (ZDB-4-ITC)ocn682564715 | ||
035 | |a (OCoLC)682564715 | ||
035 | |a (DE-599)BVBBV045348976 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 004.678 |2 22 | |
245 | 1 | 0 | |a Proceedings of a workshop on deterring cyberattacks |b informing strategies and developing options for U.S. policy = Deterring cyberattacks |c Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, Policy and Global Affairs Division, National Research Council of the National Academies |
246 | 1 | 3 | |a Deterring cyberattacks |
246 | 1 | 1 | |a Deterring cyberattacks |
264 | 1 | |a Washington, D.C. |b National Academies Press |c [2010], 2010 | |
300 | |a 1 online resource (xii, 388 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a "Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop."--Publisher's Web site | ||
500 | |a Print version record | ||
505 | 8 | |a "Examines governmental, economical, technical, legal, and psychological challenges involved in deterring cyber attacks."--Publisher's website | |
505 | 8 | |a "In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. | |
505 | 8 | |a The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. | |
505 | 8 | |a Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed."--Publisher's description | |
650 | 7 | |a COMPUTERS / Web / General |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Intranets & Extranets |2 bisacsh | |
650 | 7 | |a Cyberterrorism / Prevention |2 fast | |
650 | 7 | |a Internet / Safety measures |2 fast | |
650 | 7 | |a Internet / Security measures |2 fast | |
650 | 4 | |a Cyberterrorism |z United States |x Prevention |a Internet |x Security measures |a Internet |x Safety measures | |
650 | 0 | 7 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
651 | 7 | |a USA |0 (DE-588)4078704-7 |2 gnd |9 rswk-swf | |
655 | 7 | |8 1\p |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Washington DC |2 gnd-content | |
689 | 0 | 0 | |a USA |0 (DE-588)4078704-7 |D g |
689 | 0 | 1 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 2 | |a Sicherheitspolitik |0 (DE-588)4116489-1 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
710 | 2 | |a National Research Council (U.S.) |e Sonstige |4 oth | |
710 | 2 | |a National Research Council (U.S.) |e Sonstige |4 oth | |
710 | 2 | |a National Research Council (U.S.) |e Sonstige |4 oth | |
710 | 2 | |a National Research Council (U.S.) |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |t Proceedings of a workshop on deterring cyberattacks |d Washington, D.C. : National Academies Press, 2010 |z 9780309160353 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030735628 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804179172518526976 |
---|---|
any_adam_object | |
building | Verbundindex |
bvnumber | BV045348976 |
collection | ZDB-4-ITC |
contents | "Examines governmental, economical, technical, legal, and psychological challenges involved in deterring cyber attacks."--Publisher's website "In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed."--Publisher's description |
ctrlnum | (ZDB-4-ITC)ocn682564715 (OCoLC)682564715 (DE-599)BVBBV045348976 |
dewey-full | 004.678 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.678 |
dewey-search | 004.678 |
dewey-sort | 14.678 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05250nmm a2200649zc 4500</leader><controlfield tag="001">BV045348976</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780309160865</subfield><subfield code="9">978-0-309-16086-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0309160863</subfield><subfield code="9">0-309-16086-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282885774</subfield><subfield code="9">1-282-88577-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282885776</subfield><subfield code="9">978-1-282-88577-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn682564715</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)682564715</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045348976</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">004.678</subfield><subfield code="2">22</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Proceedings of a workshop on deterring cyberattacks</subfield><subfield code="b">informing strategies and developing options for U.S. policy = Deterring cyberattacks</subfield><subfield code="c">Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, Policy and Global Affairs Division, National Research Council of the National Academies</subfield></datafield><datafield tag="246" ind1="1" ind2="3"><subfield code="a">Deterring cyberattacks</subfield></datafield><datafield tag="246" ind1="1" ind2="1"><subfield code="a">Deterring cyberattacks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Washington, D.C.</subfield><subfield code="b">National Academies Press</subfield><subfield code="c">[2010], 2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xii, 388 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop."--Publisher's Web site</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">"Examines governmental, economical, technical, legal, and psychological challenges involved in deterring cyber attacks."--Publisher's website</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">"In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. </subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed."--Publisher's description</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Web / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Intranets & Extranets</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism / Prevention</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Safety measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="z">United States</subfield><subfield code="x">Prevention</subfield><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="a">Internet</subfield><subfield code="x">Safety measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="651" ind1=" " ind2="7"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Washington DC</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">USA</subfield><subfield code="0">(DE-588)4078704-7</subfield><subfield code="D">g</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Sicherheitspolitik</subfield><subfield code="0">(DE-588)4116489-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Research Council (U.S.)</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Research Council (U.S.)</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Research Council (U.S.)</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">National Research Council (U.S.)</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="t">Proceedings of a workshop on deterring cyberattacks</subfield><subfield code="d">Washington, D.C. : National Academies Press, 2010</subfield><subfield code="z">9780309160353</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030735628</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
genre | 1\p (DE-588)1071861417 Konferenzschrift 2010 Washington DC gnd-content |
genre_facet | Konferenzschrift 2010 Washington DC |
geographic | USA (DE-588)4078704-7 gnd |
geographic_facet | USA |
id | DE-604.BV045348976 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:38Z |
institution | BVB |
isbn | 9780309160865 0309160863 1282885774 9781282885776 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030735628 |
oclc_num | 682564715 |
open_access_boolean | |
physical | 1 online resource (xii, 388 pages) |
psigel | ZDB-4-ITC |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | National Academies Press |
record_format | marc |
spelling | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy = Deterring cyberattacks Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, Policy and Global Affairs Division, National Research Council of the National Academies Deterring cyberattacks Washington, D.C. National Academies Press [2010], 2010 1 online resource (xii, 388 pages) txt rdacontent c rdamedia cr rdacarrier "Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop."--Publisher's Web site Print version record "Examines governmental, economical, technical, legal, and psychological challenges involved in deterring cyber attacks."--Publisher's website "In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed."--Publisher's description COMPUTERS / Web / General bisacsh COMPUTERS / Networking / Intranets & Extranets bisacsh Cyberterrorism / Prevention fast Internet / Safety measures fast Internet / Security measures fast Cyberterrorism United States Prevention Internet Security measures Internet Safety measures Sicherheitspolitik (DE-588)4116489-1 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf USA (DE-588)4078704-7 gnd rswk-swf 1\p (DE-588)1071861417 Konferenzschrift 2010 Washington DC gnd-content USA (DE-588)4078704-7 g Information warfare (DE-588)4461975-3 s Sicherheitspolitik (DE-588)4116489-1 s 2\p DE-604 National Research Council (U.S.) Sonstige oth Erscheint auch als Druck-Ausgabe Proceedings of a workshop on deterring cyberattacks Washington, D.C. : National Academies Press, 2010 9780309160353 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy = Deterring cyberattacks "Examines governmental, economical, technical, legal, and psychological challenges involved in deterring cyber attacks."--Publisher's website "In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government. The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks. The second phase of the project entailed selecting appropriate experts to write papers on questions raised in the letter report. A number of experts, identified by the committee, were commissioned to write these papers under contract with the National Academy of Sciences. Commissioned papers were discussed at a public workshop held June 10-11, 2010, in Washington, D.C., and authors revised their papers after the workshop. Although the authors were selected and the papers reviewed and discussed by the committee, the individually authored papers do not reflect consensus views of the committee, and the reader should view these papers as offering points of departure that can stimulate further work on the topics discussed. The papers presented in this volume are published essentially as received from the authors, with some proofreading corrections made as limited time allowed."--Publisher's description COMPUTERS / Web / General bisacsh COMPUTERS / Networking / Intranets & Extranets bisacsh Cyberterrorism / Prevention fast Internet / Safety measures fast Internet / Security measures fast Cyberterrorism United States Prevention Internet Security measures Internet Safety measures Sicherheitspolitik (DE-588)4116489-1 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4116489-1 (DE-588)4461975-3 (DE-588)4078704-7 (DE-588)1071861417 |
title | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy = Deterring cyberattacks |
title_alt | Deterring cyberattacks |
title_auth | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy = Deterring cyberattacks |
title_exact_search | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy = Deterring cyberattacks |
title_full | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy = Deterring cyberattacks Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, Policy and Global Affairs Division, National Research Council of the National Academies |
title_fullStr | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy = Deterring cyberattacks Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, Policy and Global Affairs Division, National Research Council of the National Academies |
title_full_unstemmed | Proceedings of a workshop on deterring cyberattacks informing strategies and developing options for U.S. policy = Deterring cyberattacks Committee on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, Policy and Global Affairs Division, National Research Council of the National Academies |
title_short | Proceedings of a workshop on deterring cyberattacks |
title_sort | proceedings of a workshop on deterring cyberattacks informing strategies and developing options for u s policy deterring cyberattacks |
title_sub | informing strategies and developing options for U.S. policy = Deterring cyberattacks |
topic | COMPUTERS / Web / General bisacsh COMPUTERS / Networking / Intranets & Extranets bisacsh Cyberterrorism / Prevention fast Internet / Safety measures fast Internet / Security measures fast Cyberterrorism United States Prevention Internet Security measures Internet Safety measures Sicherheitspolitik (DE-588)4116489-1 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | COMPUTERS / Web / General COMPUTERS / Networking / Intranets & Extranets Cyberterrorism / Prevention Internet / Safety measures Internet / Security measures Cyberterrorism United States Prevention Internet Security measures Internet Safety measures Sicherheitspolitik Information warfare USA Konferenzschrift 2010 Washington DC |
work_keys_str_mv | AT nationalresearchcouncilus proceedingsofaworkshopondeterringcyberattacksinformingstrategiesanddevelopingoptionsforuspolicydeterringcyberattacks AT nationalresearchcouncilus deterringcyberattacks |