Skip to content
VuFind
  • Login
    • English
    • Deutsch
    • Español
    • Français
    • Italiano
    • 日本語
    • Nederlands
    • Português
    • Português (Brasil)
    • 中文(简体)
    • 中文(繁體)
    • Türkçe
    • עברית
    • Gaeilge
    • Cymraeg
    • Ελληνικά
    • Català
    • Euskara
    • Русский
    • Čeština
    • Suomi
    • Svenska
    • polski
    • Dansk
    • slovenščina
    • اللغة العربية
    • বাংলা
    • Galego
    • Tiếng Việt
    • Hrvatski
    • हिंदी
    • Հայերէն
    • Українська
    • Sámegiella
    • Монгол
    • Māori
Advanced
Page will reload when a filter is removed. Reset Filters
Applied Filters:
Suggested Topics: Remove Filter Phrogram (Computer program language)
Page will reload when a filter is removed.
Reset Filters
Show filters (1)
Suggested Topics: Remove Filter Phrogram (Computer program language)
  • Technology, policy, law, and e...
  • Cite this
  • Text this
  • Email this
  • Print
  • Export Record
    • Export to RefWorks
    • Export to EndNoteWeb
    • Export to EndNote
  • Save to List
  • Permanent link
Cover Image
QR Code

Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities

Show other versions (1)
Saved in:
Bibliographic Details
Corporate Authors: National Research Council (U.S.). Committee on Offensive Information Warfare, National Research Council (U.S.). Computer Science and Telecommunications Board, National Research Council (U.S.). Division on Engineering and Physical Sciences, ebrary, Inc
Other Authors: Dam, Kenneth W., Lin, Herbert, Owens, William A., 1940-
Format: Electronic eBook
Language:English
Published: Washington, DC : National Academies Press, c2009.
Subjects:
Computer networks > Security measures > Government policy > United States.
Computer networks > Security measures > United States.
Cyberspace > Security measures > United States.
Cyberterrorism > United States > Prevention.
Information warfare > United States.
Electronic books.
Online Access:An electronic book accessible through the World Wide Web; click to view
Tags: Add Tag
No Tags, Be the first to tag this record!
  • Holdings
  • Description
  • Comments
  • Other Versions (1)
  • Similar Items
  • Staff View

Internet

An electronic book accessible through the World Wide Web; click to view

Similar Items

  • Technology, policy, law, and ethics regarding U.S. acquisition and use of cyberattack capabilities
    Published: (2009)
  • Cyberdeterrence and cyberwar
    by: Libicki, Martin C.
    Published: (2009)
  • Cyberdeterrence and cyberwar
    by: Libicki, Martin C.
    Published: (2009)
  • Wars of disruption and resilience cybered conflict, power, and national security /
    by: Demchak, Chris C.
    Published: (2011)
  • Wars of disruption and resilience cybered conflict, power, and national security /
    by: Demchak, Chris C.
    Published: (2011)

Search Options

  • Search History
  • Advanced Search

Find More

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items

Need Help?

  • Search Tips
  • Ask a Librarian
  • FAQs