skip to content
Cyberdeterrence and cyberwar Preview this item
ClosePreview this item
Checking...

Cyberdeterrence and cyberwar

Author: Martin C Libicki; Project Air Force (U.S.)
Publisher: Santa Monica, CA : RAND, 2009.
Series: Rand Corporation monograph series.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences andways the United States protect itself in the  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Martin C Libicki; Project Air Force (U.S.)
ISBN: 0833048759 9780833048752
OCLC Number: 1021370334
Description: 1 ressource en ligne (xxiv, 214 pages) : illustrations.
Contents: Introduction --
A conceptual framework --
Why cyberdeterrence is different --
Why the purpose of the original cyberattack matters --
A strategy of response --
Strategic cyberwar --
Operational cyberwar --
Cyberdefense --
Tricky terrain --
Appendixes: A. What constitutes an act of war in cyberspace? --
B. The calculus of explicit versus implicit deterrence --
C. The dimprospects for cyber arms control.
Series Title: Rand Corporation monograph series.
Responsibility: Martin C. Libicki.

Abstract:

Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences andways the United States protect itself in the face of attack.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1021370334> # Cyberdeterrence and cyberwar
    a schema:Book, schema:MediaObject, schema:CreativeWork ;
    library:oclcnum "1021370334" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/315916387#Place/santa_monica_ca> ; # Santa Monica, CA
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/cau> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/315916387#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/315916387#Topic/civil_defense> ; # Civil defense
    schema:about <http://experiment.worldcat.org/entity/work/data/315916387#Topic/cyberspace_security_measures> ; # Cyberspace--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/315916387#Topic/information_warfare> ; # Information warfare
    schema:about <http://dewey.info/class/355.343/e22/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/315916387#Topic/technology_military_science> ; # TECHNOLOGY--Military Science
    schema:about <http://experiment.worldcat.org/entity/work/data/315916387#Topic/cyberterrorism_prevention> ; # Cyberterrorism--Prevention
    schema:about <http://experiment.worldcat.org/entity/work/data/315916387#Topic/civil_defense_united_states> ; # Civil defense--United States
    schema:about <http://experiment.worldcat.org/entity/work/data/315916387#Topic/political_science_political_freedom_&_security_terrorism> ; # POLITICAL SCIENCE--Political Freedom & Security--Terrorism
    schema:about <http://experiment.worldcat.org/entity/work/data/315916387#Topic/cyberterrorism_united_states_prevention> ; # Cyberterrorism--United States--Prevention
    schema:about <http://experiment.worldcat.org/entity/work/data/315916387#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/315916387#Topic/computer_networks_security_measures_united_states> ; # Computer networks--Security measures--United States
    schema:about <http://experiment.worldcat.org/entity/work/data/315916387#Topic/information_warfare_united_states> ; # Information warfare--United States
    schema:about <http://experiment.worldcat.org/entity/work/data/315916387#Place/united_states> ; # United States.
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/315916387#Organization/project_air_force_u_s> ; # Project Air Force (U.S.)
    schema:creator <http://experiment.worldcat.org/entity/work/data/315916387#Person/libicki_martin_c> ; # Martin C. Libicki
    schema:datePublished "2009" ;
    schema:description "Introduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dimprospects for cyber arms control." ;
    schema:description "Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences andways the United States protect itself in the face of attack." ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/315916387> ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/315916387#Series/rand_corporation_monograph_series> ; # Rand Corporation monograph series.
    schema:name "Cyberdeterrence and cyberwar" ;
    schema:productID "1021370334" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/1021370334#PublicationEvent/santa_monica_ca_rand_2009> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/315916387#Agent/rand> ; # RAND
    schema:url <http://proxy.cm.umoncton.ca/login?url=http://www.jstor.org/stable/10.7249/mg877af> ;
    schema:workExample <http://worldcat.org/isbn/9780833048752> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1021370334> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/315916387#Organization/project_air_force_u_s> # Project Air Force (U.S.)
    a schema:Organization ;
    schema:name "Project Air Force (U.S.)" ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Person/libicki_martin_c> # Martin C. Libicki
    a schema:Person ;
    schema:familyName "Libicki" ;
    schema:givenName "Martin C." ;
    schema:name "Martin C. Libicki" ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Place/santa_monica_ca> # Santa Monica, CA
    a schema:Place ;
    schema:name "Santa Monica, CA" ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Place/united_states> # United States.
    a schema:Place ;
    schema:name "United States." ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Series/rand_corporation_monograph_series> # Rand Corporation monograph series.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/1021370334> ; # Cyberdeterrence and cyberwar
    schema:name "Rand Corporation monograph series." ;
    schema:name "RAND Corporation monograph series" ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Topic/civil_defense_united_states> # Civil defense--United States
    a schema:Intangible ;
    schema:name "Civil defense--United States"@fr ;
    schema:name "Civil defense--United States" ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures" ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Topic/computer_networks_security_measures_united_states> # Computer networks--Security measures--United States
    a schema:Intangible ;
    schema:name "Computer networks--Security measures--United States"@fr ;
    schema:name "Computer networks--Security measures--United States" ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General" ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Topic/cyberspace_security_measures> # Cyberspace--Security measures
    a schema:Intangible ;
    schema:name "Cyberspace--Security measures"@fr ;
    schema:name "Cyberspace--Security measures" ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Topic/cyberterrorism_prevention> # Cyberterrorism--Prevention
    a schema:Intangible ;
    schema:name "Cyberterrorism--Prevention" ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Topic/cyberterrorism_united_states_prevention> # Cyberterrorism--United States--Prevention
    a schema:Intangible ;
    schema:name "Cyberterrorism--United States--Prevention"@fr ;
    schema:name "Cyberterrorism--United States--Prevention" ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Topic/information_warfare> # Information warfare
    a schema:Intangible ;
    schema:name "Information warfare" ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Topic/information_warfare_united_states> # Information warfare--United States
    a schema:Intangible ;
    schema:name "Information warfare--United States"@fr ;
    schema:name "Information warfare--United States" ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Topic/political_science_political_freedom_&_security_terrorism> # POLITICAL SCIENCE--Political Freedom & Security--Terrorism
    a schema:Intangible ;
    schema:name "POLITICAL SCIENCE--Political Freedom & Security--Terrorism" ;
    .

<http://experiment.worldcat.org/entity/work/data/315916387#Topic/technology_military_science> # TECHNOLOGY--Military Science
    a schema:Intangible ;
    schema:name "TECHNOLOGY--Military Science" ;
    .

<http://proxy.cm.umoncton.ca/login?url=http://www.jstor.org/stable/10.7249/mg877af>
    rdfs:comment "(Accès réservé aux usagers de l'UdeM)" ;
    .

<http://worldcat.org/isbn/9780833048752>
    a schema:ProductModel ;
    schema:isbn "0833048759" ;
    schema:isbn "9780833048752" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.