Cyberdeterrence and cyberwar /
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but th...
Saved in:
Main Author: | |
---|---|
Corporate Author: | |
Format: | Book |
Language: | English |
Published: |
Santa Monica, CA :
RAND,
2009
Santa Monica, CA : 2009 |
Series: | MG (Rand Corporation) ;
MG-877-AF Rand Corporation monograph series MG-877-AF |
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Internet
//IF NOT LOGGED IN - FORCE LOGIN ?> //ELSE THEY ARE LOGGED IN PROCEED WITH THE OPEN URL CODE:?>Stanford University
Call Number: |
U163 .L539 2009 |
---|
Yale University
Call Number: |
U163 .L539X 2009 (LC) |
---|
University of Chicago
Call Number: |
U163 .L539 2009 |
---|
Massachusetts Institute of Technology
Call Number: |
U163.L539 2009 |
---|
Harvard University
Call Number: |
U163 .L539 2009 |
---|
Duke University
Call Number: |
MG-877- AF |
---|
Dartmouth College
Call Number: |
U163 .L539 2009 |
---|
Cornell University
Call Number: |
U163 .L539 2009 |
---|
Princeton University
Call Number: |
U163 .L539 2009 |
---|
University of Pennsylvania
Call Number: |
U163 .L539 2009 |
---|
Brown University
Call Number: |
U163 .L539 2009 |
---|