Vai al contenuto principale della pagina
Titolo: | Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies |
Pubblicazione: | Washington, DC, : National Academies Press, c2009 |
Edizione: | 1st ed. |
Descrizione fisica: | 1 online resource (390 p.) |
Disciplina: | 355.3/43 |
Soggetto topico: | Computer networks - Security measures - Government policy - United States |
Computer networks - Security measures - United States | |
Cyberspace - Security measures - United States | |
Cyberterrorism - United States - Prevention | |
Information warfare - United States | |
Altri autori: | DamKenneth W LinHerbert OwensWilliam A. <1940-> |
Note generali: | Bibliographic Level Mode of Issuance: Monograph |
Nota di bibliografia: | Includes bibliographical references. |
Nota di contenuto: | FrontMatter -- Preface -- Acknowledgment of Reviewers -- Contents -- Synopsis -- 1 Overview, Findings, and Recommendations -- Part I: Framing and Basic Technology -- 2 Technical and Operational Considerations in Cyberattack and Cyberexploitation -- Part II: Mission and Institutional Perspectives -- 3 A Military Perspective on Cyberattack -- 4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation -- 5 Perspectives on Cyberattack Outside National Security -- 6 Decision Making and Oversight -- Part III: Intellectual Tools for Understanding and Thinking About Cyberattack -- 7 Legal and Ethical Perspectives on Cyberattack -- 8 Insights from Related Areas -- 9 Speculations on the Dynamics of Cyberconflict -- 10 Alternative Futures -- Appendixes -- Appendix A: Biographies of Committee Members and Staff -- Appendix B: Meeting Participants and Other Contributors -- Appendix C: Illustrative Criminal Cyberattacks -- Appendix D: Views on the Use of Force in Cyberspace -- Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions. |
Titolo autorizzato: | Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities |
ISBN: | 1-282-43723-2 |
9786612437236 | |
0-309-13851-5 | |
Formato: | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione: | Inglese |
Record Nr.: | 9910810215403321 |
Lo trovi qui: | Univ. Federico II |
Opac: | Controlla la disponibilità qui |