Cyber Threats The Emerging Fault Lines of the Nation State
- Publisher's listprice GBP 93.00
-
44 430 Ft (42 315 Ft + 5% VAT)
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 10% (cc. 4 443 Ft off)
- Discounted price 39 988 Ft (38 084 Ft + 5% VAT)
Subcribe now and take benefit of a favourable price.
Subscribe
44 430 Ft
Availability
printed on demand
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Publisher OUP USA
- Date of Publication 26 March 2009
- ISBN 9780195385014
- Binding Hardback
- No. of pages320 pages
- Size 155x239x30 mm
- Weight 612 g
- Language English 0
Categories
Long description:
As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace has allowed virtually anyone to launch an attack from a remote and anonymous location. But once these attacks occur, it raises several important questions; who should respond, and how?; how should nation-states effectively deal with a cyber-attack?; and will the United States and other nation-states be able to survive in a world where virtual boundaries are limitless?
In Cyberthreats: The Emerging Fault Lines of the Nation State Susan Brenner gives a thorough explanation of how military and law enforcement personnel respond to these attacks and why bringing cyber-terrorist to justice can be difficult and sometimes impossible.
Table of Contents:
INTRODUCTION
ORDER & DISORDER: CRIME, WAR AND TERRORISM
CYBERTHREATS: NEW ISSUES, NEW CHALLENGES
ATTRIBUTION: ATTACKS
ATTRIBUTION: ATTACKERS
RESPONSE: WHERE WE ARE
HOW DID WE GET HERE?
WHERE DO WE GO FROM HERE?