Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
While the deterrence of cyber attacks is one of the most important issues facing the United States and other nations, the application of deterrence theory to the cyber realm is problematic. This study introduces cyber warfare and reviews the challenges associated with deterring cyber attacks, offering key recommendations to aid the deterrence of major cyber attacks.
While the deterrence of cyber attacks is one of the most important issues facing the United States and other nations, the application of deterrence theory to the cyber realm is problematic. This study introduces cyber warfare and reviews the challenges associated with deterring cyber attacks, offering key recommendations to aid the deterrence of major cyber attacks.
Brian M. Mazanec, PhD, is an Adjunct Professor at George Mason University and a senior defence analyst with the U.S. government. Brian's academic research has been published in numerous journals, presented at international conferences, and used as part of the curriculum in the United States Army War College's Department of Military Strategy, Planning and Operations.
Bradley A. Thayer, PhD, is a Professor in the Department of Political Science at the University of Iceland. His research encompasses a broad range of professional interests in the fields of International Relations Theory and International Security.
Inhaltsangabe
1. Introduction 2. Cyberspace and Cyber Warfare 3. Deterrence Theory and the Challenge of Applying It to Cyber Warfare 4. Chapter Four: Cultivating Beneficial Norms for Strategic Stability 5. Continuing Efforts to Improve Cyber Forensics and Bolster Defences 6. Developing a Declaratory Policy and Offensive Cyber Weapons 7. Conclusions
1. Introduction 2. Cyberspace and Cyber Warfare 3. Deterrence Theory and the Challenge of Applying It to Cyber Warfare 4. Chapter Four: Cultivating Beneficial Norms for Strategic Stability 5. Continuing Efforts to Improve Cyber Forensics and Bolster Defences 6. Developing a Declaratory Policy and Offensive Cyber Weapons 7. Conclusions
1. Introduction 2. Cyberspace and Cyber Warfare 3. Deterrence Theory and the Challenge of Applying It to Cyber Warfare 4. Chapter Four: Cultivating Beneficial Norms for Strategic Stability 5. Continuing Efforts to Improve Cyber Forensics and Bolster Defences 6. Developing a Declaratory Policy and Offensive Cyber Weapons 7. Conclusions
1. Introduction 2. Cyberspace and Cyber Warfare 3. Deterrence Theory and the Challenge of Applying It to Cyber Warfare 4. Chapter Four: Cultivating Beneficial Norms for Strategic Stability 5. Continuing Efforts to Improve Cyber Forensics and Bolster Defences 6. Developing a Declaratory Policy and Offensive Cyber Weapons 7. Conclusions
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497