Getting It Right: Protecting American Critical Infrastructure in Cyberspace. Getting It Right: Protecting American Critical Infrastructure in Cyberspace.

Getting It Right: Protecting American Critical Infrastructure in Cyberspace‪.‬

Harvard Journal of Law & Technology 2007, Spring, 20, 2

    • 2,99 €
    • 2,99 €

Description de l’éditeur

THE DOGMAS OF THE QUIET PAST ARE INADEQUATE TO THE STORMY PRESENT. THE OCCASION IS PILED HIGH WITH DIFFICULTY, AND WE MUST RISE TO THE OCCASION. AS OUR CASE IS NEW, SO WE MUST THINK ANEW AND ACT ANEW. (1) WHERE ONCE OUR OPPONENTS RELIED EXCLUSIVELY ON BOMBS AND BULLETS, HOSTILE POWERS AND TERRORISTS CAN NOW TURN A LAPTOP COMPUTER INTO A POTENT WEAPON CAPABLE OF DOING ENORMOUS DAMAGE. IF WE ARE TO CONTINUE TO ENJOY THE BENEFITS OF THE INFORMATION AGE, PRESERVE OUR SECURITY, AND SAFEGUARD OUR ECONOMIC WELL-BEING, WE MUST PROTECT OUR CRITICAL COMPUTER-CONTROLLED SYSTEMS FROM ATTACK. (2)

GENRE
Professionnel et technique
SORTIE
2007
22 mars
LANGUE
EN
Anglais
LONGUEUR
36
Pages
ÉDITIONS
Harvard Law School, Harvard Journal of Law & Technology
TAILLE
219,4
Ko

Plus de livres similaires

The Virtual Weapon and International Order The Virtual Weapon and International Order
2017
Conflicts, Crimes and Regulations in Cyberspace Conflicts, Crimes and Regulations in Cyberspace
2021
Essential Guide to Air Force Cyberspace: 50 Cyber Questions Every Airman Can Answer, Airpower Lessons for an Air Force Cyber-Power Targeting Theory, Conceptualizing Cyber Intelligence, ISR, USCYBERCOM Essential Guide to Air Force Cyberspace: 50 Cyber Questions Every Airman Can Answer, Airpower Lessons for an Air Force Cyber-Power Targeting Theory, Conceptualizing Cyber Intelligence, ISR, USCYBERCOM
2019
Strategies for Resolving the Cyber Attribution Challenge: Spoofing to Mask Geography, American Sponsorship of Embryonic Global Norms, Framework for Diplomacy and Defense, Leading by Example Strategies for Resolving the Cyber Attribution Challenge: Spoofing to Mask Geography, American Sponsorship of Embryonic Global Norms, Framework for Diplomacy and Defense, Leading by Example
2016
Information Warfare Information Warfare
2012
Addressing Cyber Instability Addressing Cyber Instability
2013

Plus de livres par Harvard Journal of Law & Technology

A Knot in the Eternal Golden Braid: Searching for Coherence in the Relationship Between Enablement, Anticipation, And Obviousness. A Knot in the Eternal Golden Braid: Searching for Coherence in the Relationship Between Enablement, Anticipation, And Obviousness.
2010
Much Ado About Data Ownership. Much Ado About Data Ownership.
2011
The Wealth of Networks: How Social Production Transforms Markets and Freedom (Book Review) The Wealth of Networks: How Social Production Transforms Markets and Freedom (Book Review)
2006
Brand Spillovers. Brand Spillovers.
2009
Bad Faith in Cyberspace: Grounding Domain Name Theory in Trademark, Property, And Restitution. Bad Faith in Cyberspace: Grounding Domain Name Theory in Trademark, Property, And Restitution.
2010
Open Source Semiconductor Core Licensing. Open Source Semiconductor Core Licensing.
2011