Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
Subjects: Technology, Political Science
You do not have access to this book on JSTOR. Try logging in through your institution for access.
Log in to your personal account or through your institution.
Table of Contents
Export Selected Citations
Export to NoodleTools
Export to RefWorks
Export to EasyBib
Export a RIS file
(For EndNote, ProCite, Reference Manager, Zotero, Mendeley...)
Export a Text file