Toward effective cyber defense in accordance with the rules of law /:
"Information and communication technologies now play a big part in the daily personal and professional lives of us all. Cyberspace - the interconnected digital technology domain which underlies communications, transportation, state administration, finance, medicine and education - is part of al...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam :
IOS Press,
2020.
|
Schriftenreihe: | NATO science for peace and security series. Human and societal dynamics ;
vol. 149. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "Information and communication technologies now play a big part in the daily personal and professional lives of us all. Cyberspace - the interconnected digital technology domain which underlies communications, transportation, state administration, finance, medicine and education - is part of all our lives. In the last decade, the digital revolution in the South Eastern European (SEE) countries has given more people there access to communication, education, and news than ever before, and we should not underestimate the power of these information and communication technologies. This book presents papers from the NATO Science for Peace and Security Advanced Training Course (ATC) Toward Effective Cyber Defense in Accordance With the Rules of Law, held in Ohrid, Republic of North Macedonia, in November 2019. The course focused on the SEE countries, where, in general, governments have paid appropriate attention to developing cyber defense capacities. In some cases, however, limitations in technological resources have restricted the capabilities of governments to respond to the ever-evolving challenges of defending the cyber domain. Laws and regulations differ from country to country, and the topics covered here were carefully chosen to cover issues in laws and regulations, cyber defense policies and their practical implementation. The series of papers presented in this book will provide a deeper understanding of these topics for scholars, associated professionals in the public and private sectors, and for a more general audience"-- |
Beschreibung: | "Proceedings of the NATO Advanced Training Course titled "Toward effective cyber defense in accordance with the rules of law", Republic of North Macedonia, November 2019." |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781643680873 1643680870 1643680862 9781643680866 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1162844605 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr ||||||||||| | ||
008 | 200705s2020 ne ob 101 0 eng d | ||
040 | |a YDX |b eng |e pn |c YDX |d N$T |d EBLCP |d TEF |d IOSPR |d VT2 |d OCLCQ |d OCLCO |d K6U |d OCLCQ |d PSYSI |d OCLCQ |d OCLCL |d SXB | ||
019 | |a 1161988416 |a 1294687935 | ||
020 | |a 9781643680873 |q (electronic bk.) | ||
020 | |a 1643680870 |q (electronic bk.) | ||
020 | |a 1643680862 | ||
020 | |a 9781643680866 | ||
020 | |z 9781643680866 | ||
035 | |a (OCoLC)1162844605 |z (OCoLC)1161988416 |z (OCoLC)1294687935 | ||
043 | |a e------ | ||
050 | 4 | |a HD30.38 | |
082 | 7 | |a 658.478 |2 23 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Toward effective cyber defense in accordance with the rules of law / |c edited by Alan Brill, Kristina Misheva and Metodi Hadji-Janev. |
260 | |a Amsterdam : |b IOS Press, |c 2020. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a NATO science for peace and security series; Sub-series E, Human and societal dynamics ; |v vol. 149 | |
500 | |a "Proceedings of the NATO Advanced Training Course titled "Toward effective cyber defense in accordance with the rules of law", Republic of North Macedonia, November 2019." | ||
505 | 0 | |a Intro -- Title Page -- Preface -- Editor's Introductory Notes. About the Project -- About the Editors -- About the Contributors -- Notice -- Contents -- Does Artificial Intelligence Need a General Counsel? -- Realities in Dealing with Cyber-Threats in South Eastern Europe -- Day of the Drone: Protecting Critical Infrastructure from Terrorist Use of Unmanned Aerial Systems -- Common Security and Defence Policy and Cyber Defence -- Using Precise Words Precisely: Classifying Cyberoperations Under Jus ad Bellum | |
505 | 8 | |a NATO and Partner Countries Cooperation in Countering Asymmetric and Hybrid Threats in South Eastern Europe's Cyberspace -- Some Thoughts About the Fight Against Terrorist Financing in Hungary and in the European Union -- US and EU Governmental Efforts to Protect Controlled Unclassified Information from Cyber Threats -- International Human Rights Laws and International Law of Armed Conflict During Cyber Defense Operations -- Subject Index -- Author Index | |
504 | |a Includes bibliographical references and index. | ||
520 | |a "Information and communication technologies now play a big part in the daily personal and professional lives of us all. Cyberspace - the interconnected digital technology domain which underlies communications, transportation, state administration, finance, medicine and education - is part of all our lives. In the last decade, the digital revolution in the South Eastern European (SEE) countries has given more people there access to communication, education, and news than ever before, and we should not underestimate the power of these information and communication technologies. This book presents papers from the NATO Science for Peace and Security Advanced Training Course (ATC) Toward Effective Cyber Defense in Accordance With the Rules of Law, held in Ohrid, Republic of North Macedonia, in November 2019. The course focused on the SEE countries, where, in general, governments have paid appropriate attention to developing cyber defense capacities. In some cases, however, limitations in technological resources have restricted the capabilities of governments to respond to the ever-evolving challenges of defending the cyber domain. Laws and regulations differ from country to country, and the topics covered here were carefully chosen to cover issues in laws and regulations, cyber defense policies and their practical implementation. The series of papers presented in this book will provide a deeper understanding of these topics for scholars, associated professionals in the public and private sectors, and for a more general audience"-- |c Provided by publisher | ||
650 | 0 | |a Business enterprises |x Computer networks |x Security measures |x Law and legislation. | |
650 | 0 | |a Cyberinfrastructure |x Law and legislation. | |
655 | 4 | |a Electronic book. | |
700 | 1 | |a Brill, Alan. | |
700 | 1 | |a Misheva, Kristina. | |
700 | 1 | |a Hadji-Janev, Metodi. | |
758 | |i has work: |a Toward effective cyber defense in accordance with the rules of law (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGDQtxV68tpjdfWh6K4Fyq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Toward effective cyber defense in accordance with the rules of law. |d Amsterdam : IOS Press, 2020 |w (DLC) 2020939340 |
830 | 0 | |a NATO science for peace and security series. |n E, |p Human and societal dynamics ; |v vol. 149. |0 http://id.loc.gov/authorities/names/no2007135253 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2512580 |3 Volltext |
938 | |a ProQuest Ebook Central |b EBLB |n EBL6240699 | ||
938 | |a EBSCOhost |b EBSC |n 2512580 | ||
938 | |a YBP Library Services |b YANK |n 301357894 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1162844605 |
---|---|
_version_ | 1816882524023947264 |
adam_text | |
any_adam_object | |
author2 | Brill, Alan Misheva, Kristina Hadji-Janev, Metodi |
author2_role | |
author2_variant | a b ab k m km m h j mhj |
author_facet | Brill, Alan Misheva, Kristina Hadji-Janev, Metodi |
author_sort | Brill, Alan |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | H - Social Science |
callnumber-label | HD30 |
callnumber-raw | HD30.38 |
callnumber-search | HD30.38 |
callnumber-sort | HD 230.38 |
callnumber-subject | HD - Industries, Land Use, Labor |
collection | ZDB-4-EBA |
contents | Intro -- Title Page -- Preface -- Editor's Introductory Notes. About the Project -- About the Editors -- About the Contributors -- Notice -- Contents -- Does Artificial Intelligence Need a General Counsel? -- Realities in Dealing with Cyber-Threats in South Eastern Europe -- Day of the Drone: Protecting Critical Infrastructure from Terrorist Use of Unmanned Aerial Systems -- Common Security and Defence Policy and Cyber Defence -- Using Precise Words Precisely: Classifying Cyberoperations Under Jus ad Bellum NATO and Partner Countries Cooperation in Countering Asymmetric and Hybrid Threats in South Eastern Europe's Cyberspace -- Some Thoughts About the Fight Against Terrorist Financing in Hungary and in the European Union -- US and EU Governmental Efforts to Protect Controlled Unclassified Information from Cyber Threats -- International Human Rights Laws and International Law of Armed Conflict During Cyber Defense Operations -- Subject Index -- Author Index |
ctrlnum | (OCoLC)1162844605 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05107cam a2200553 a 4500</leader><controlfield tag="001">ZDB-4-EBA-on1162844605</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |||||||||||</controlfield><controlfield tag="008">200705s2020 ne ob 101 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">YDX</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">YDX</subfield><subfield code="d">N$T</subfield><subfield code="d">EBLCP</subfield><subfield code="d">TEF</subfield><subfield code="d">IOSPR</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">PSYSI</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1161988416</subfield><subfield code="a">1294687935</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781643680873</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1643680870</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1643680862</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781643680866</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781643680866</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1162844605</subfield><subfield code="z">(OCoLC)1161988416</subfield><subfield code="z">(OCoLC)1294687935</subfield></datafield><datafield tag="043" ind1=" " ind2=" "><subfield code="a">e------</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">HD30.38</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">658.478</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Toward effective cyber defense in accordance with the rules of law /</subfield><subfield code="c">edited by Alan Brill, Kristina Misheva and Metodi Hadji-Janev.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NATO science for peace and security series; Sub-series E, Human and societal dynamics ;</subfield><subfield code="v">vol. 149</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Proceedings of the NATO Advanced Training Course titled "Toward effective cyber defense in accordance with the rules of law", Republic of North Macedonia, November 2019."</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Title Page -- Preface -- Editor's Introductory Notes. About the Project -- About the Editors -- About the Contributors -- Notice -- Contents -- Does Artificial Intelligence Need a General Counsel? -- Realities in Dealing with Cyber-Threats in South Eastern Europe -- Day of the Drone: Protecting Critical Infrastructure from Terrorist Use of Unmanned Aerial Systems -- Common Security and Defence Policy and Cyber Defence -- Using Precise Words Precisely: Classifying Cyberoperations Under Jus ad Bellum</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">NATO and Partner Countries Cooperation in Countering Asymmetric and Hybrid Threats in South Eastern Europe's Cyberspace -- Some Thoughts About the Fight Against Terrorist Financing in Hungary and in the European Union -- US and EU Governmental Efforts to Protect Controlled Unclassified Information from Cyber Threats -- International Human Rights Laws and International Law of Armed Conflict During Cyber Defense Operations -- Subject Index -- Author Index</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Information and communication technologies now play a big part in the daily personal and professional lives of us all. Cyberspace - the interconnected digital technology domain which underlies communications, transportation, state administration, finance, medicine and education - is part of all our lives. In the last decade, the digital revolution in the South Eastern European (SEE) countries has given more people there access to communication, education, and news than ever before, and we should not underestimate the power of these information and communication technologies. This book presents papers from the NATO Science for Peace and Security Advanced Training Course (ATC) Toward Effective Cyber Defense in Accordance With the Rules of Law, held in Ohrid, Republic of North Macedonia, in November 2019. The course focused on the SEE countries, where, in general, governments have paid appropriate attention to developing cyber defense capacities. In some cases, however, limitations in technological resources have restricted the capabilities of governments to respond to the ever-evolving challenges of defending the cyber domain. Laws and regulations differ from country to country, and the topics covered here were carefully chosen to cover issues in laws and regulations, cyber defense policies and their practical implementation. The series of papers presented in this book will provide a deeper understanding of these topics for scholars, associated professionals in the public and private sectors, and for a more general audience"--</subfield><subfield code="c">Provided by publisher</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Business enterprises</subfield><subfield code="x">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberinfrastructure</subfield><subfield code="x">Law and legislation.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic book.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brill, Alan.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Misheva, Kristina.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hadji-Janev, Metodi.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Toward effective cyber defense in accordance with the rules of law (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGDQtxV68tpjdfWh6K4Fyq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Toward effective cyber defense in accordance with the rules of law.</subfield><subfield code="d">Amsterdam : IOS Press, 2020</subfield><subfield code="w">(DLC) 2020939340</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">NATO science for peace and security series.</subfield><subfield code="n">E,</subfield><subfield code="p">Human and societal dynamics ;</subfield><subfield code="v">vol. 149.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007135253</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2512580</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6240699</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2512580</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">301357894</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic book. |
genre_facet | Electronic book. |
id | ZDB-4-EBA-on1162844605 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:58Z |
institution | BVB |
isbn | 9781643680873 1643680870 1643680862 9781643680866 |
language | English |
oclc_num | 1162844605 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IOS Press, |
record_format | marc |
series | NATO science for peace and security series. Human and societal dynamics ; |
series2 | NATO science for peace and security series; Sub-series E, Human and societal dynamics ; |
spelling | Toward effective cyber defense in accordance with the rules of law / edited by Alan Brill, Kristina Misheva and Metodi Hadji-Janev. Amsterdam : IOS Press, 2020. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier NATO science for peace and security series; Sub-series E, Human and societal dynamics ; vol. 149 "Proceedings of the NATO Advanced Training Course titled "Toward effective cyber defense in accordance with the rules of law", Republic of North Macedonia, November 2019." Intro -- Title Page -- Preface -- Editor's Introductory Notes. About the Project -- About the Editors -- About the Contributors -- Notice -- Contents -- Does Artificial Intelligence Need a General Counsel? -- Realities in Dealing with Cyber-Threats in South Eastern Europe -- Day of the Drone: Protecting Critical Infrastructure from Terrorist Use of Unmanned Aerial Systems -- Common Security and Defence Policy and Cyber Defence -- Using Precise Words Precisely: Classifying Cyberoperations Under Jus ad Bellum NATO and Partner Countries Cooperation in Countering Asymmetric and Hybrid Threats in South Eastern Europe's Cyberspace -- Some Thoughts About the Fight Against Terrorist Financing in Hungary and in the European Union -- US and EU Governmental Efforts to Protect Controlled Unclassified Information from Cyber Threats -- International Human Rights Laws and International Law of Armed Conflict During Cyber Defense Operations -- Subject Index -- Author Index Includes bibliographical references and index. "Information and communication technologies now play a big part in the daily personal and professional lives of us all. Cyberspace - the interconnected digital technology domain which underlies communications, transportation, state administration, finance, medicine and education - is part of all our lives. In the last decade, the digital revolution in the South Eastern European (SEE) countries has given more people there access to communication, education, and news than ever before, and we should not underestimate the power of these information and communication technologies. This book presents papers from the NATO Science for Peace and Security Advanced Training Course (ATC) Toward Effective Cyber Defense in Accordance With the Rules of Law, held in Ohrid, Republic of North Macedonia, in November 2019. The course focused on the SEE countries, where, in general, governments have paid appropriate attention to developing cyber defense capacities. In some cases, however, limitations in technological resources have restricted the capabilities of governments to respond to the ever-evolving challenges of defending the cyber domain. Laws and regulations differ from country to country, and the topics covered here were carefully chosen to cover issues in laws and regulations, cyber defense policies and their practical implementation. The series of papers presented in this book will provide a deeper understanding of these topics for scholars, associated professionals in the public and private sectors, and for a more general audience"-- Provided by publisher Business enterprises Computer networks Security measures Law and legislation. Cyberinfrastructure Law and legislation. Electronic book. Brill, Alan. Misheva, Kristina. Hadji-Janev, Metodi. has work: Toward effective cyber defense in accordance with the rules of law (Text) https://id.oclc.org/worldcat/entity/E39PCGDQtxV68tpjdfWh6K4Fyq https://id.oclc.org/worldcat/ontology/hasWork Print version: Toward effective cyber defense in accordance with the rules of law. Amsterdam : IOS Press, 2020 (DLC) 2020939340 NATO science for peace and security series. E, Human and societal dynamics ; vol. 149. http://id.loc.gov/authorities/names/no2007135253 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2512580 Volltext |
spellingShingle | Toward effective cyber defense in accordance with the rules of law / NATO science for peace and security series. Human and societal dynamics ; Intro -- Title Page -- Preface -- Editor's Introductory Notes. About the Project -- About the Editors -- About the Contributors -- Notice -- Contents -- Does Artificial Intelligence Need a General Counsel? -- Realities in Dealing with Cyber-Threats in South Eastern Europe -- Day of the Drone: Protecting Critical Infrastructure from Terrorist Use of Unmanned Aerial Systems -- Common Security and Defence Policy and Cyber Defence -- Using Precise Words Precisely: Classifying Cyberoperations Under Jus ad Bellum NATO and Partner Countries Cooperation in Countering Asymmetric and Hybrid Threats in South Eastern Europe's Cyberspace -- Some Thoughts About the Fight Against Terrorist Financing in Hungary and in the European Union -- US and EU Governmental Efforts to Protect Controlled Unclassified Information from Cyber Threats -- International Human Rights Laws and International Law of Armed Conflict During Cyber Defense Operations -- Subject Index -- Author Index Business enterprises Computer networks Security measures Law and legislation. Cyberinfrastructure Law and legislation. |
title | Toward effective cyber defense in accordance with the rules of law / |
title_auth | Toward effective cyber defense in accordance with the rules of law / |
title_exact_search | Toward effective cyber defense in accordance with the rules of law / |
title_full | Toward effective cyber defense in accordance with the rules of law / edited by Alan Brill, Kristina Misheva and Metodi Hadji-Janev. |
title_fullStr | Toward effective cyber defense in accordance with the rules of law / edited by Alan Brill, Kristina Misheva and Metodi Hadji-Janev. |
title_full_unstemmed | Toward effective cyber defense in accordance with the rules of law / edited by Alan Brill, Kristina Misheva and Metodi Hadji-Janev. |
title_short | Toward effective cyber defense in accordance with the rules of law / |
title_sort | toward effective cyber defense in accordance with the rules of law |
topic | Business enterprises Computer networks Security measures Law and legislation. Cyberinfrastructure Law and legislation. |
topic_facet | Business enterprises Computer networks Security measures Law and legislation. Cyberinfrastructure Law and legislation. Electronic book. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2512580 |
work_keys_str_mv | AT brillalan towardeffectivecyberdefenseinaccordancewiththerulesoflaw AT mishevakristina towardeffectivecyberdefenseinaccordancewiththerulesoflaw AT hadjijanevmetodi towardeffectivecyberdefenseinaccordancewiththerulesoflaw |