Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / (Record no. 78656)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 02003cam a22003255a 4500 |
001 - CONTROL NUMBER | |
control field | 16248141 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | SE-LIBR |
005 - DATE AND TIME | |
control field | 20140804131447.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr|||||||||||| |
008 - GENERAL INFORMATION | |
fixed length control field | 140321s2014 xx |||| o |||| 0|und d |
020 ## - ISBN | |
Cancelled/invalid ISBN | 9780309138505 (Print) |
040 ## - CATALOGUING LIBRARY | |
Original cataloging library | Sipr |
041 ## - LANGUAGE CODE | |
Language code | eng |
110 ## - INSTITUTION | |
Institution | Committee on Offensive Information Warfare |
245 10 - TITLE | |
Title | Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities / |
Medium | [electronic resource] |
Author, etc | William A. Owens, Kenneth W. Dam, and Herbert S. Lin, editors ; Committee on Offensive Information Warfare; Computer Science and Telecommunications Board (CSTB); Division on Engineering and Physical Sciences (DEPS); National Research Council |
260 ## - PUBLICATION DATA | |
Place of publication | Washington, DC : |
Publisher | NAP, |
Year | 2009 |
300 ## - PAGES ETC | |
Pages | 367 p. |
500 ## - GENERAL NOTE | |
General note | SIP1422 |
500 ## - GENERAL NOTE | |
General note | Focusing on the use of cyberattack as an instrument of U.S. national policy, Technology, Policy, Law and Ethics Regarding U.S. Acquisition and Use of Cyberattack Capabilities explores important characteristics of cyberattack. It describes the current international and domestic legal structure as it might apply to cyberattack, and considers analogies to other domains of conflict to develop relevant insights. Of special interest to the military, intelligence, law enforcement, and homeland security communities, this report is also an essential point of departure for nongovernmental researchers interested in this rarely discussed topic.<br/> |
650 ## - KEYWORD | |
Keyword | terrorism |
Subdivision | IW |
-- | ethics |
Geographic subdivision | USA |
650 ## - KEYWORD | |
Keyword | intelligence |
653 ## - UNCONTROLLED KEYWORD | |
Uncontrolled keyword | cyberattack |
700 ## - ADDED AUTHOR/EDITOR | |
Author/Editor | Owens, William A. |
700 ## - ADDED AUTHOR/EDITOR | |
Author/Editor | Dam, Kenneth W. |
700 ## - ADDED AUTHOR/EDITOR | |
Author/Editor | Lin, Herbert S. |
710 ## - ADDED INSTITUTION | |
Institution | National Research Council, NRC. |
Subordinate unit | Division on Engineering and Physical Sciences, DEPS. Computer Science and Telecommunications Board, CSTB. Committee on Offensive Information Warfare |
852 ## - LOCATION | |
Classification part | CD2014 G14_306 |
856 ## - ELECTRONIC LOCATION | |
URI | http://www.nap.edu/catalog.php?record_id=12651 |
942 ## - ITEM TYPE (KOHA) | |
Koha item type | electronic publication |
Withdrawn status | Lost status | Damaged status | Not for loan | Home library | Current library | Date acquired | Total Checkouts | Full call number | Acquisition no. | Date last seen | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|
SIPRI Library and Documentation | SIPRI Library and Documentation | 2014-08-04 | CD2014 G14_306 | G14/306 | 2014-08-04 | electronic publication |