Cyberdeterrence and Cyberwar
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but th...
Saved in:
Main Author: | Libicki, Martin C. (auth) |
---|---|
Format: | Electronic Book Chapter |
Language: | English |
Published: |
RAND Corporation
2009
|
Subjects: | |
Online Access: | DOAB: download the publication DOAB: description of the publication |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Exploring Terrorist Targeting Preferences
by: Libicki, Martin C.
Published: (2007) -
Building Security in the Persian Gulf
by: Hunter, Robert E.
Published: (2010) -
The Long Shadow of 9/11 America's Response to Terrorism
Published: (2011) -
Assessing Irregular Warfare A Framework for Intelligence Analysis
by: Larson, Eric V.
Published: (2008) -
Rethinking Counterinsurgency RAND Counterinsurgency Study--Volume 5
by: Mackinlay, John
Published: (2008)