Verwandte Artikel zu Deterring Cybertrespass And Securing Cyberspace: Lessons...

Deterring Cybertrespass And Securing Cyberspace: Lessons From United States Border Control Strategies - Softcover

 
9781387580972: Deterring Cybertrespass And Securing Cyberspace: Lessons From United States Border Control Strategies

Inhaltsangabe

In recent years, analysts have begun discussing strategies for securing entities in cyberspace—including the files and software belonging to corporations, government institutions, and private individuals. Increasingly, analysts have suggested utilizing two types of deterrence strategies: deterrence by denial and deterrence by punishment. In determining how both deterrence strategies might be applied to preventing hostile individuals, states, and nonstate actors from entering cyberspace and inflicting damage there, analysts have borrowed from deterrence strategies that have been framed for a variety of other situations. While the tendency among members of the military community is to look to other military situations— such as nuclear war, or the use of biological or chemical weapons—in which deterrence strategies may have been used, it is my contention that these scenarios are not necessarily the best fit for describing what happens in cyberspace.

Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.

Reseña del editor

In recent years, analysts have begun discussing strategies for securing entities in cyberspace-including the files and software belonging to corporations, government institutions, and private individuals. Increasingly, analysts have suggested utilizing two types of deterrence strategies: deterrence by denial and deterrence by punishment. In determining how both deterrence strategies might be applied to preventing hostile individuals, states, and nonstate actors from entering cyberspace and inflicting damage there, analysts have borrowed from deterrence strategies that have been framed for a variety of other situations. While the tendency among members of the military community is to look to other military situations- such as nuclear war, or the use of biological or chemical weapons-in which deterrence strategies may have been used, it is my contention that these scenarios are not necessarily the best fit for describing what happens in cyberspace.

„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.

Gratis für den Versand innerhalb von/der Deutschland

Versandziele, Kosten & Dauer

Weitere beliebte Ausgaben desselben Titels

9781076743633: Deterring Cybertrespass and Securing Cyberspace: Lessons from United States Border Control Strategies

Vorgestellte Ausgabe

ISBN 10:  1076743633 ISBN 13:  9781076743633
Verlag: Independently published, 2019
Softcover

Suchergebnisse für Deterring Cybertrespass And Securing Cyberspace: Lessons...

Foto des Verkäufers

Manjikian, Mary
Verlag: Lulu.com, 2018
ISBN 10: 1387580973 ISBN 13: 9781387580972
Neu Softcover

Anbieter: moluna, Greven, Deutschland

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Zustand: New. Bestandsnummer des Verkäufers 447542751

Verkäufer kontaktieren

Neu kaufen

EUR 23,51
Währung umrechnen
Versand: Gratis
Innerhalb Deutschlands
Versandziele, Kosten & Dauer

Anzahl: Mehr als 20 verfügbar

In den Warenkorb

Foto des Verkäufers

Mary Manjikian
Verlag: Lulu.Com, 2018
ISBN 10: 1387580973 ISBN 13: 9781387580972
Neu Taschenbuch
Print-on-Demand

Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland

Verkäuferbewertung 5 von 5 Sternen 5 Sterne, Erfahren Sie mehr über Verkäufer-Bewertungen

Taschenbuch. Zustand: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In recent years, analysts have begun discussing strategies for securing entities in cyberspace-including the files and software belonging to corporations, government institutions, and private individuals. Increasingly, analysts have suggested utilizing two types of deterrence strategies: deterrence by denial and deterrence by punishment. In determining how both deterrence strategies might be applied to preventing hostile individuals, states, and nonstate actors from entering cyberspace and inflicting damage there, analysts have borrowed from deterrence strategies that have been framed for a variety of other situations. While the tendency among members of the military community is to look to other military situations- such as nuclear war, or the use of biological or chemical weapons-in which deterrence strategies may have been used, it is my contention that these scenarios are not necessarily the best fit for describing what happens in cyberspace. Bestandsnummer des Verkäufers 9781387580972

Verkäufer kontaktieren

Neu kaufen

EUR 27,60
Währung umrechnen
Versand: Gratis
Innerhalb Deutschlands
Versandziele, Kosten & Dauer

Anzahl: 1 verfügbar

In den Warenkorb