In recent years, analysts have begun discussing strategies for securing entities in cyberspace—including the files and software belonging to corporations, government institutions, and private individuals. Increasingly, analysts have suggested utilizing two types of deterrence strategies: deterrence by denial and deterrence by punishment. In determining how both deterrence strategies might be applied to preventing hostile individuals, states, and nonstate actors from entering cyberspace and inflicting damage there, analysts have borrowed from deterrence strategies that have been framed for a variety of other situations. While the tendency among members of the military community is to look to other military situations— such as nuclear war, or the use of biological or chemical weapons—in which deterrence strategies may have been used, it is my contention that these scenarios are not necessarily the best fit for describing what happens in cyberspace.
"Sinopsis" puede pertenecer a otra edición de este libro.
In recent years, analysts have begun discussing strategies for securing entities in cyberspace-including the files and software belonging to corporations, government institutions, and private individuals. Increasingly, analysts have suggested utilizing two types of deterrence strategies: deterrence by denial and deterrence by punishment. In determining how both deterrence strategies might be applied to preventing hostile individuals, states, and nonstate actors from entering cyberspace and inflicting damage there, analysts have borrowed from deterrence strategies that have been framed for a variety of other situations. While the tendency among members of the military community is to look to other military situations- such as nuclear war, or the use of biological or chemical weapons-in which deterrence strategies may have been used, it is my contention that these scenarios are not necessarily the best fit for describing what happens in cyberspace.
"Sobre este título" puede pertenecer a otra edición de este libro.
EUR 11,99 gastos de envío desde Alemania a España
Destinos, gastos y plazos de envíoLibrería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - In recent years, analysts have begun discussing strategies for securing entities in cyberspace-including the files and software belonging to corporations, government institutions, and private individuals. Increasingly, analysts have suggested utilizing two types of deterrence strategies: deterrence by denial and deterrence by punishment. In determining how both deterrence strategies might be applied to preventing hostile individuals, states, and nonstate actors from entering cyberspace and inflicting damage there, analysts have borrowed from deterrence strategies that have been framed for a variety of other situations. While the tendency among members of the military community is to look to other military situations- such as nuclear war, or the use of biological or chemical weapons-in which deterrence strategies may have been used, it is my contention that these scenarios are not necessarily the best fit for describing what happens in cyberspace. Nº de ref. del artículo: 9781387580972
Cantidad disponible: 1 disponibles
Librería: moluna, Greven, Alemania
Condición: New. Nº de ref. del artículo: 447542751
Cantidad disponible: Más de 20 disponibles