Online Public Access Catalogue (OPAC)
Library,Documentation and Information Science Division

“A research journal serves that narrow

borderland which separates the known from the unknown”

-P.C.Mahalanobis


Normal view MARC view ISBD view

Cyberdeterrence and cyberwar [electronic resource] / Martin C. Libicki.

By: Libicki, Martin C.
Contributor(s): Project Air Force (U.S.).
Material type: TextTextSeries: Rand Corporation monograph series: Publisher: Santa Monica, CA : RAND, 2009Description: 1 online resource (xxiv, 214 p.) : ill.ISBN: 9780833048752 (electronic bk.); 0833048759 (electronic bk.); 9780833047342 (pbk. : alk. paper); 0833047345 (pbk. : alk. paper).Subject(s): Information warfare -- United States | Cyberterrorism -- United States -- Prevention | Cyberspace -- Security measures | Computer networks -- Security measures -- United States | Civil defense -- United States | COMPUTERS -- Security -- General | POLITICAL SCIENCE -- Political Freedom & Security -- Terrorism | TECHNOLOGY -- Military ScienceGenre/Form: Electronic books.Additional physical formats: Print version:: Cyberdeterrence and cyberwar.DDC classification: 355.3/43 Online resources: EBSCOhost
Contents:
Introduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dim prospects for cyber arms control.
Summary: Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

"Prepared for the United States Air Force."

"Rand Project Air Force."

Includes bibliographical references (p. 225-214).

Introduction -- A conceptual framework -- Why cyberdeterrence is different -- Why the purpose of the original cyberattack matters -- A strategy of response -- Strategic cyberwar -- Operational cyberwar -- Cyberdefense -- Tricky terrain -- Appendixes: A. What constitutes an act of war in cyberspace? -- B. The calculus of explicit versus implicit deterrence -- C. The dim prospects for cyber arms control.

Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.

Description based on print version record.

There are no comments for this item.

Log in to your account to post a comment.

Other editions of this work

Cyberdeterrence and cyberwar by Libicki, Martin C. ©2009
Library, Documentation and Information Science Division, Indian Statistical Institute, 203 B T Road, Kolkata 700108, INDIA
Phone no. 91-33-2575 2100, Fax no. 91-33-2578 1412, ksatpathy@isical.ac.in


Visitor Counter