Vai al contenuto principale della pagina
| Titolo: |
Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / / William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies
|
| Pubblicazione: | Washington, DC, : National Academies Press, c2009 |
| Edizione: | 1st ed. |
| Descrizione fisica: | 1 online resource (390 p.) |
| Disciplina: | 355.3/43 |
| Soggetto topico: | Computer networks - Security measures - Government policy - United States |
| Computer networks - Security measures - United States | |
| Cyberspace - Security measures - United States | |
| Cyberterrorism - United States - Prevention | |
| Information warfare - United States | |
| Altri autori: |
DamKenneth W
LinHerbert
OwensWilliam A. <1940->
|
| Note generali: | Bibliographic Level Mode of Issuance: Monograph |
| Nota di bibliografia: | Includes bibliographical references. |
| Nota di contenuto: | FrontMatter -- Preface -- Acknowledgment of Reviewers -- Contents -- Synopsis -- 1 Overview, Findings, and Recommendations -- Part I: Framing and Basic Technology -- 2 Technical and Operational Considerations in Cyberattack and Cyberexploitation -- Part II: Mission and Institutional Perspectives -- 3 A Military Perspective on Cyberattack -- 4 An Intelligence Community Perspective on Cyberattack and Cyberexploitation -- 5 Perspectives on Cyberattack Outside National Security -- 6 Decision Making and Oversight -- Part III: Intellectual Tools for Understanding and Thinking About Cyberattack -- 7 Legal and Ethical Perspectives on Cyberattack -- 8 Insights from Related Areas -- 9 Speculations on the Dynamics of Cyberconflict -- 10 Alternative Futures -- Appendixes -- Appendix A: Biographies of Committee Members and Staff -- Appendix B: Meeting Participants and Other Contributors -- Appendix C: Illustrative Criminal Cyberattacks -- Appendix D: Views on the Use of Force in Cyberspace -- Appendix E: Technical Vulnerabilities Targeted by Cyber Offensive Actions. |
| Titolo autorizzato: | Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities ![]() |
| ISBN: | 9786612437236 |
| 9781282437234 | |
| 1282437232 | |
| 9780309138512 | |
| 0309138515 | |
| Formato: | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione: | Inglese |
| Record Nr.: | 9910963701403321 |
| Lo trovi qui: | Univ. Federico II |
| Opac: | Controlla la disponibilità qui |