Coverart for item
The Resource Cyberspace in peace and war, Martin C. Libicki

Cyberspace in peace and war, Martin C. Libicki

Label
Cyberspace in peace and war
Title
Cyberspace in peace and war
Statement of responsibility
Martin C. Libicki
Creator
Author
Subject
Language
eng
Summary
"Cyberspace in Peace and War presents a comprehensive understanding of cybersecurity, cyberwar, and cyber terrorism. From basic concepts to advanced principles, Libicki examines the sources and consequences of system compromises, addresses how cybersecurity policies can strengthen countries defenses--leaving them less susceptible to cyberattack, and explores cybersecurity in the context of military operations, highlighting unique aspects of the digital battleground and strategic uses of cyberwar. He provides the technical and geopolitical foundations of cyberwar necessary to understand the policies, operations, and strategies required for safeguarding an increasingly online infrastructure."--Provided by publisher
Member of
Cataloging source
DLC
http://library.link/vocab/creatorName
Libicki, Martin C
Dewey number
355.3/43
Illustrations
illustrations
Index
index present
LC call number
U163
LC item number
.L519 2016
Literary form
non fiction
Nature of contents
bibliography
Series statement
Transforming war
http://library.link/vocab/subjectName
  • Cyberspace operations (Military science)
  • Cyberspace
  • Cyberspace
  • Cyberterrorism
Label
Cyberspace in peace and war, Martin C. Libicki
Instantiates
Publication
Bibliography note
Includes bibliographical references (pages 423-460) and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Part I. Foundations. Emblematic attacks ; Some basic principles ; How to compromise a computer ; The search for cybersecurity ; Defending against attacks of high and of broad consequence ; What the government can and cannot do -- Part II. Policies. What should be secret ; What does China's economically motivated cyberespionage cost the United States? ; Return to vendor ; Cybersecurity futures ; Operational cyberwar -- Part III. Operations. Organizing a cyberwar campaign ; Professionalizing cyberwar ; Is cyberspace a warfighting domain? ; Strategic implications of operational cyberwar ; Stability implications of operational cyberwar ; Strategic cyberwar -- Part IV. Strategies. Cyberwar threats as coercion -- The unexpected asymmetry of cyberwar ; Responding to cyberattack ; Deterrence fundamentals ; The will to retaliate ; Attribution ; What threshold and confidence for response? ; Punishment and holding targets at risk ; Deterrence by denial ; Cyberwar escalation ; Brandishing cyberattack capabilities ; Cyberattack in nuclear confrontation ; Narratives and signals ; Strategic stability -- Part V. Norms. Norms for cyberspace ; Sino-American relations and norms in cyberspace ; Cyberwar: what is it good for?
Control code
ocn927363798
Dimensions
27 cm.
Extent
xvi, 478 pages
Isbn
9781682470329
Lccn
2016031363
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
System control number
(OCoLC)927363798
Label
Cyberspace in peace and war, Martin C. Libicki
Publication
Bibliography note
Includes bibliographical references (pages 423-460) and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Part I. Foundations. Emblematic attacks ; Some basic principles ; How to compromise a computer ; The search for cybersecurity ; Defending against attacks of high and of broad consequence ; What the government can and cannot do -- Part II. Policies. What should be secret ; What does China's economically motivated cyberespionage cost the United States? ; Return to vendor ; Cybersecurity futures ; Operational cyberwar -- Part III. Operations. Organizing a cyberwar campaign ; Professionalizing cyberwar ; Is cyberspace a warfighting domain? ; Strategic implications of operational cyberwar ; Stability implications of operational cyberwar ; Strategic cyberwar -- Part IV. Strategies. Cyberwar threats as coercion -- The unexpected asymmetry of cyberwar ; Responding to cyberattack ; Deterrence fundamentals ; The will to retaliate ; Attribution ; What threshold and confidence for response? ; Punishment and holding targets at risk ; Deterrence by denial ; Cyberwar escalation ; Brandishing cyberattack capabilities ; Cyberattack in nuclear confrontation ; Narratives and signals ; Strategic stability -- Part V. Norms. Norms for cyberspace ; Sino-American relations and norms in cyberspace ; Cyberwar: what is it good for?
Control code
ocn927363798
Dimensions
27 cm.
Extent
xvi, 478 pages
Isbn
9781682470329
Lccn
2016031363
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
System control number
(OCoLC)927363798

Library Locations

    • Academic LibraryBorrow it
      2020 S. Avenue 8E, Yuma, AZ, 85366, US
      32.6910976 -114.6289698
Processing Feedback ...