Access controlled : the shaping of power, rights, and rule in cyberspace / / Ronald Deibert [and others], editors
| Access controlled : the shaping of power, rights, and rule in cyberspace / / Ronald Deibert [and others], editors |
| Pubbl/distr/stampa | Cambridge, Mass., : MIT Press, ©2010 |
| Descrizione fisica | 1 online resource (xvi, 617 p. ) : ill., maps ; |
| Disciplina | 005.8 |
| Altri autori (Persone) |
DeibertRonald
PalfreyJohn RohozinskiRafal ZittrainJonathan |
| Collana | Information revolution and global politics |
| Soggetto topico |
Cyberspace - Government policy
Internet - Government policy Computers - Access control Internet - Censorship |
| ISBN |
9780262290739
0262290731 9780262514354 0262514354 9780262266031 0262266032 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Beyond denial : introducing next-generation information access controls / Ronald Deibert and Rafal Rohozinski -- Control and subversion in Russian cyberspace / Ronald Deibert and Rafal Rohozinski -- The EU data retention directive in an era of Internet surveillance / Hal Roberts and John Palfrey -- Barriers to cooperation : an analysis of the origins of international efforts to protect children online / Nart Villeneuve -- Intermediary censorship / Ethan Zuckerman -- Protecting privacy and expression online : can the Global Network Initiative embrace the character of the Net? / Colin M. Maclay -- Introduction to the country profiles -- Commonwealth of Independent States : CIS overview ; Armenia ; Azerbaijan ; Belarus ; Georgia ; Kazakhstan ; Kyrgyzstan ; Moldova ; Russia ; Tajikistan ; Turkmenistan ; Ukraine ; Uzbekistan -- Europe : Europe overview ; France ; Germany ; Italy ; Nordic countries ; Turkey ; United Kingdom -- North America : United States and Canada overview -- Australia and New Zealand : Australia and New Zealand overview -- Asia : Asia overview ; Burma ; China ; Pakistan ; South Korea -- Middle East and North Africa : MENA overview ; Egypt ; Iran ; Saudi Arabia ; Syria ; Tunisia ; United Arab Emirates. |
| Record Nr. | UNINA-9910306646103321 |
| Cambridge, Mass., : MIT Press, ©2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
China and international law in cyberspace / / Kimberly Hsu, with Craig Murray
| China and international law in cyberspace / / Kimberly Hsu, with Craig Murray |
| Autore | Hsu Kimberly |
| Pubbl/distr/stampa | [Washington, D.C.] : , : U.S.-China Economic and Security Review Commission, , 2014 |
| Descrizione fisica | 1 online resource (10 pages) |
| Collana | U.S. China Economic and Security Review Commission staff report |
| Soggetto topico |
Cyberspace - Government policy - China
Internet - Political aspects - China Internet - Law and legislation - China Cyber intelligence (Computer security) - China Cyber intelligence (Computer security) Cyberspace - Government policy Internet - Political aspects |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNINA-9910716923603321 |
Hsu Kimberly
|
||
| [Washington, D.C.] : , : U.S.-China Economic and Security Review Commission, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber peace : charting a path toward a sustainable, stable, and secure cyberspace / / edited by Scott J. Shackelford, Frédérick Douzet, Christopher Ankersen [[electronic resource]]
| Cyber peace : charting a path toward a sustainable, stable, and secure cyberspace / / edited by Scott J. Shackelford, Frédérick Douzet, Christopher Ankersen [[electronic resource]] |
| Autore | Shackelford Scott J |
| Pubbl/distr/stampa | Cambridge University Press, 2022 |
| Descrizione fisica | 1 online resource (xxxi, 253 pages) : digital, PDF file(s) |
| Disciplina | 363.325 |
| Collana | Social Sciences |
| Soggetto topico |
Cyberterrorism - Prevention
Cyberspace - Government policy |
| Soggetto non controllato |
cyberwar
cyberpeace cybersecurity international law environmental law international relations |
| ISBN |
1-108-95746-3
1-108-95766-8 1-108-95434-0 |
| Classificazione | LAW051000 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Introduction / Scott Shackelford, Frederick Douzet & Chris Ankersen -- Part 1. Beyond stability, towards cyber peace : key concepts, visions, and models of cyber peace -- Cyber peace : is that a thing? / Renée Marlin-Bennett -- Digital repression and state capacity : old concepts, new capacities / Jessica Steinberg, Cyanne Loyle, and Federica Carugati -- Part 2. Modalities : how might cyber peace be achieved? What practices and processes might need to be followed in order to make it a reality? -- Information sharing as a critical best practice for the sustainability of cyber peace / Deborah Housen-Couriel -- Cyber operations as off-ramps to war / Brandon Valeriano and Benjamin Jensen -- Cyber peace and intrastate conflicts : toward cyber peacebuilding? / Jean-Marie Chenou and John Bonilla -- Cybersecurity & AI / Tabrez Ebrahim -- Part 3. Lessons learned and looking ahead -- The criminalization of cyber-attacks under the International Criminal Court's Rome Statute / Jennifer Trahan -- Diverse verifiers are a prerequisite to cyber peace / Rob Knake and Adam Shostack -- Building cyber peace while preparing cyber war / Frédérick Douzet, Aude Géry, and François Delerue -- Part 4. Reflections and research notes -- Imagining cyber peace : an interview with a cyberpeace pioneer / Camille François and Christopher Ankersen -- Overcoming barriers to empirical cyber research / Anne Boustead and Scott Shackelford -- Bits and peaces : solving the jigsaw to secure cyberspace / Stéphane Duguin, Francesca Bosco, and Juliana Crema -- How cyber hygiene contributes to cyber peace / Megan Stifel, Kayle Giroud, and Ryan Walsh -- Crowdsourcing cyber peace and cyber security / Vineet Kumar -- Advanced persistent threat groups increasingly destabilize peace and security in cyberspace / Anne-Marie Buzatu. |
| Record Nr. | UNINA-9910585964703321 |
Shackelford Scott J
|
||
| Cambridge University Press, 2022 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber strategy : the evolving character of power and coercion
| Cyber strategy : the evolving character of power and coercion |
| Pubbl/distr/stampa | New York, : Oxford University Press, [2018] |
| Descrizione fisica | 1 online resource (305 pages) |
| Altri autori (Persone) |
JensenBenjamin M
ManessRyan ValerianoBrandon |
| Soggetto topico |
Cyberterrorism
Information warfare Cyberspace operations (Military science) Cyberspace - Government policy Cyberspace - Political aspects Technology and international relations Cyberspace Internationale relationer Teknologi |
| Soggetto genere / forma | Electronic Books |
| ISBN |
0-19-061811-6
0-19-061812-4 0-19-061810-8 |
| Classificazione | 355.02 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | How rival states employ cyber strategy : disruption, espionage, and degradation -- The correlates of cyber strategy -- Cyber coercion as a combined strategy -- Commissars and crooks : Russian cyber coercion -- China and the technology gap : Chinese strategic behavior in cyberspace -- The United States : the cyber reconnaissance-strike complex. |
| Record Nr. | UNINA-9910795059103321 |
| New York, : Oxford University Press, [2018] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyber strategy : the evolving character of power and coercion
| Cyber strategy : the evolving character of power and coercion |
| Pubbl/distr/stampa | New York, : Oxford University Press, [2018] |
| Descrizione fisica | 1 online resource (305 pages) |
| Altri autori (Persone) |
JensenBenjamin M
ManessRyan ValerianoBrandon |
| Soggetto topico |
Cyberterrorism
Information warfare Cyberspace operations (Military science) Cyberspace - Government policy Cyberspace - Political aspects Technology and international relations Cyberspace Internationale relationer Teknologi |
| Soggetto genere / forma | Electronic Books |
| ISBN |
0-19-061811-6
0-19-061812-4 0-19-061810-8 |
| Classificazione | 355.02 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | How rival states employ cyber strategy : disruption, espionage, and degradation -- The correlates of cyber strategy -- Cyber coercion as a combined strategy -- Commissars and crooks : Russian cyber coercion -- China and the technology gap : Chinese strategic behavior in cyberspace -- The United States : the cyber reconnaissance-strike complex. |
| Record Nr. | UNINA-9910828127903321 |
| New York, : Oxford University Press, [2018] | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cyberspace : malevolent actors, criminal opportunities, and strategic competition / / Phil Williams, Dighton Fiddner, editors
| Cyberspace : malevolent actors, criminal opportunities, and strategic competition / / Phil Williams, Dighton Fiddner, editors |
| Pubbl/distr/stampa | Carlisle Barracks, PA : , : Strategic Studies Institute and U.S. Army War College Press, , 2016 |
| Descrizione fisica | 1 online resource (xv, 677 pages) : color illustrations, color maps |
| Soggetto topico |
Cyberspace
Cyberspace - Government policy Cyberterrorism Computer crimes Information warfare |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | CYBERSPACE |
| Record Nr. | UNINA-9910708455903321 |
| Carlisle Barracks, PA : , : Strategic Studies Institute and U.S. Army War College Press, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Distinguishing acts of war in cyberspace : assessment criteria, policy considerations, and response implications / / Jeffrey L. Caton
| Distinguishing acts of war in cyberspace : assessment criteria, policy considerations, and response implications / / Jeffrey L. Caton |
| Autore | Caton Jeffrey L. |
| Pubbl/distr/stampa | Carlisle, PA : , : Strategic Studies Institute and U.S. Army War College Press, , 2014 |
| Descrizione fisica | 1 online resource (x, 102 pages) |
| Soggetto topico |
Computer crimes - United States
Cyberspace - Security measures - United States Information warfare - United States Cyberspace - Government policy - United States Cyberterrorism - United States Computer crimes Cyberspace - Government policy Cyberterrorism Information warfare |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Distinguishing acts of war in cyberspace |
| Record Nr. | UNINA-9910708691903321 |
Caton Jeffrey L.
|
||
| Carlisle, PA : , : Strategic Studies Institute and U.S. Army War College Press, , 2014 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage / / Bryan Krekel, Patton Adams, George Bakos
| Occupying the information high ground : Chinese capabilities for computer network operations and cyber espionage / / Bryan Krekel, Patton Adams, George Bakos |
| Autore | Krekel Bryan A. |
| Pubbl/distr/stampa | [Washington, D.C.] : , : U.S.-China Economic and Security Review Administration, , 2012 |
| Descrizione fisica | 1 online resource (136 pages) |
| Soggetto topico |
Cyberspace - Government policy - China
Computer crimes - China Cyberterrorism - China Information warfare - China Internet in espionage - China Telecommunication - Research - China Computer crimes Cyberspace - Government policy Cyberterrorism Information technology Information warfare Internet in espionage Telecommunication - Research |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Occupying the information high ground |
| Record Nr. | UNINA-9910716668903321 |
Krekel Bryan A.
|
||
| [Washington, D.C.] : , : U.S.-China Economic and Security Review Administration, , 2012 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Rethinking sovereignty in the context of cyberspace : the cyber sovereignty workshop series / / written and compiled by Cynthia E. Ayers
| Rethinking sovereignty in the context of cyberspace : the cyber sovereignty workshop series / / written and compiled by Cynthia E. Ayers |
| Autore | Ayers Cynthia E. |
| Pubbl/distr/stampa | Carlisle Barracks, Pennsylvania : , : U.S. Army War College, , 2016 |
| Descrizione fisica | 1 online resource (xiv, 160 pages) : color illustrations |
| Soggetto topico |
Cyberspace - Political aspects - United States
Cyberspace - Government policy - United States Cyberinfrastructure - Security measures - United States Cyberspace operations (Military science) - United States Sovereignty Cyberspace - Government policy Cyberspace operations (Military science) Cyberspace - Political aspects |
| Soggetto genere / forma | Conference papers and proceedings. |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Altri titoli varianti | Rethinking sovereignty in the context of cyberspace |
| Record Nr. | UNINA-9910715484703321 |
Ayers Cynthia E.
|
||
| Carlisle Barracks, Pennsylvania : , : U.S. Army War College, , 2016 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
The Virtual Weapon and International Order
| The Virtual Weapon and International Order |
| Autore | Kello Lucas |
| Pubbl/distr/stampa | New Haven, CT, : Yale University Press, 2019 |
| Descrizione fisica | 1 online resource (333 pages) |
| Disciplina | 355.4 |
| Altri autori (Persone) | Kello, Lucas |
| Soggetto topico |
Cyberspace operations (Military science)
Cyberspace - Security measures Cyberspace - Government policy Security, International International sikkerhed Cybersikkerhed Militærvidenskab |
| ISBN | 0-300-22629-2 |
| Classificazione | 355.4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Frontmatter -- Contents -- Tables -- Acknowledgments -- Introduction -- PART I. THEORY AND CONCEPTS -- CHAPTER 1. The Quest for Cyber Theory -- CHAPTER 2. The Cyber Curse: COMPLICATIONS OF DEFENSE -- CHAPTER 3. Technological Revolution and International Order -- PART II. DEGREES OF THE CYBER REVOLUTION -- CHAPTER 4. Third-Order Cyber Revolution: PROBLEMS OF INADVERTENT CONFLICT -- CHAPTER 5. Second-Order Cyber Revolution: THE PROBLEM OF THE REVOLUTIONARY STATE -- CHAPTER 6. First-Order Cyber Revolution: PRESSURES FROM OUTSIDE THE STATES SYSTEM -- PART III. PROBLEMS OF STRATEGY AND POLICY -- CHAPTER 7. The Deterrence Puzzle: DOCTRINAL PROBLEMS AND REMEDIES -- CHAPTER 8. Russia and Cyberspace: MANIFESTATIONS OF THE REVOLUTION -- CHAPTER 9. Private Sector Active Defense: AN ADEQUATE RESPONSE TO THE SOVEREIGNTY GAP? -- CHAPTER 10. Cyber Futures -- Notes -- Bibliography -- Index |
| Record Nr. | UNINA-9910794982803321 |
Kello Lucas
|
||
| New Haven, CT, : Yale University Press, 2019 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||