LEADER 04105oam 2200433zu 450 001 996215691203316 005 20210807004709.0 010 $a9949-9040-9-9 035 $a(CKB)3420000000000597 035 $a(SSID)ssj0000781114 035 $a(PQKBManifestationID)12386125 035 $a(PQKBTitleCode)TC0000781114 035 $a(PQKBWorkID)10803381 035 $a(PQKB)10981283 035 $a(NjHacI)993420000000000597 035 $a(EXLCZ)993420000000000597 100 $a20160829d2012 uy 101 0 $aeng 135 $aur||||||||||| 181 $ctxt 182 $cc 183 $acr 200 10$a2012 4th International Conference on Cyber Conflict 210 31$a[Place of publication not identified]$cIEEE$d2012 215 $a1 online resource (viii, 453 pages) $cillustrations 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a1-4673-1270-3 327 $aLegal implications of territorial sovereignty in cyberspace / Wollff Heintschel von Heinegg When "Not my problem" isn't enough: political neutrality and national responsibility in cyber conflict / Jason Healey Neutrality in cyberspace / Wolff Heintschel von Heinegg Impact of cyberspace on human rights and democracy / Vittorio Fanchiotti, Jean Paul Pierini Russia's public stance on cyber/information warfare / Keir Giles French cyberdefense policy / Patrice Tromparent A treaty for governing cyber-weapons: potential benefits and practical limitations / Louise Arimatsu Internet as a critical infrastructure: a framework for the measurement of maturity and awareness in the cyber sphere / Assaf Y. Keren, Keren Elazari The significance of attribution to cyberspace coercion: a political perspective / Forrest Hare The militarisation of cyberspace: why less may be better / Myriam Dunn Cavelty Beyond domains, beyond commons: the context and theory of conflict in cyberspace / Jeffrey L. Caton Applying traditional military principles to cyber warfare / Samuel Liles, J. Eric Dietz, Marcus Rogers, Dean Larson The principle of maneuver in cyber operations / Scott D. Applegate Countering the offensive advantage in cyberspace: an integrated defensive strategy / David T. Fahrenkrug An analysis for a just cyber warfare / Mariarosaria Taddeo Socially engineered commoners as cyber warriors: Estonian future or present? / Birgy Lorenz, Kaido Kikkas The notion of combatancy in cyber warfare / Sean Watts Direct participation in cyber hostilities: terms of reference for like-minded states? / Jody Prescott Attack trends in present computer networks / Robert Koch, Bjo?rn Stelte, Mario Golling "Attack" as a term of art in international law: the cyber operations context / Michael N. Schmitt Ius ad bellum in cyberspace: some thoughts on the "Schmitt-criteria" for use of force / Katharina Ziolkowski The "Use of force" in cyberspace: a reply to Dr. Ziolkowski / Michael N. Schmitt A methodology for cyber operations targeting and control of collateral damage in the context of lawful armed conflict / Robert Fanelli, Gregory Conti Command and control of cyber weapons / Enn Tyugu A case study on the Miner botnet / Daniel Plohmann, Elmar Gerhards-Padilla Natural privacy preservation protocol for electronic mail / Kim Hartmann, Christoph Steup Paradigm change of vehicle cyber-security / Hiro Onishi Sensing for suspicion at scale: a Bayesian approach for cyber conflict attribution and reasoning / Harsha K. Kalutarage, Siraj A. Shaikh, Qin Zhou, Anne E. James The role of COTS products for high security systems / Robert Koch, Gabi Dreo Rodosek Conceptual framework for cyber defense information sharing within trust relationships / Diego Ferna?ndez Va?zquez, Oscar Pastor Acosta, Christopher Spirito, Sarah Brown, Emily Reid. 606 $aComputer security$vCongresses 606 $aCyberterrorism 615 0$aComputer security 615 0$aCyberterrorism. 676 $a005.8 702 $aIEEE Staff 801 0$bPQKB 906 $aPROCEEDING 912 $a996215691203316 996 $a2012 4th International Conference on Cyber Conflict$92497277 997 $aUNISA LEADER 01158nam a2200325 i 4500 001 991000776929707536 005 20020507173439.0 008 970306s1972 us ||| | eng 020 $a0691081042 035 $ab1075572x-39ule_inst 035 $aLE01302147$9ExL 040 $aDip.to Matematica$beng 084 $aAMS 01A50 084 $aAMS 01A60 084 $aAMS 68-03 084 $aAMS 68-XX 100 1 $aGoldstine, Herman Heine$040841 245 14$aThe computer from Pascal to von Neumann /$cHerman H. Goldstein 260 $a[Princeton, N. J.] :$bPrinceton Univ. Press,$cc1972 300 $ax, 378 p. :$bill. ;$c25 cm. 500 $aIncludes bibliographical references 650 4$aComputers-history 650 4$aHistory of mathematics-18th century 650 4$aHistory of mathematics-19th century 907 $a.b1075572x$b21-09-06$c28-06-02 912 $a991000776929707536 945 $aLE013 68-XX GOL21 (1972)$g1$i2013000078441$lle013$o-$pE0.00$q-$rl$s- $t0$u2$v0$w2$x0$y.i1084997x$z28-06-02 996 $aComputer from Pascal to von Neumann$9348381 997 $aUNISALENTO 998 $ale013$b01-01-97$cm$da $e-$feng$gus $h4$i1 LEADER 01538oam 22003494a 450 001 9910146165803321 005 20230828220844.0 035 $a(CKB)1000000000280019 035 $a(MH)009007823-3 035 $a(EXLCZ)991000000000280019 100 $a20021202d2002 uy 0 101 0 $aita 200 00$aLuoghi e paesaggi nella narrativa di Pirandello $eatti del convegno di Roma, 19-21 dicembre 2001 /$fa cura di Gianvito Resta$b[electronic resource] 210 $aRoma $cSalerno$dc2002 215 $a1 online resource (256 p. ) 225 1 $aStudi e saggi ;$v28 300 $a"Ministero per i beni e le attivitą culturali, Comitato nazionale per lo studio e la valorizzazione dell'opera di Luigi Pirandello"--P. opp. t.p. 311 $a88-8402-394-7 320 $aIncludes bibliographical references and index. 410 0$aStudi e saggi (Salerno editrice) ;$v28. 608 $aConference papers and proceedings.$2fast 676 $a852/.912 702 $aResta$b Gianvito 712 02$aComitato nazionale per lo studio e la valorizzazione dell'opera di Luigi Pirandello. 801 0$bDLC 801 1$bDLC 801 2$bDLC 906 $aBOOK 912 $a9910146165803321 996 $aLuoghi e paesaggi nella narrativa di Pirandello$92438212 997 $aUNINA 999 $aThis Record contains information from the Harvard Library Bibliographic Dataset, which is provided by the Harvard Library under its Bibliographic Dataset Use Terms and includes data made available by, among others the Library of Congress