Book contents
- Managing Cyber Attacks in International Law, Business, and Relations
- Managing Cyber Attacks in International Law, Business, and Relations
- Copyright page
- Dedication
- Dedication
- Contents
- Tables and Figures
- Foreword
- Preface
- Acknowledgments
- Abbreviations
- Part I Foundations of Polycentric Governance in Cyberspace
- Part II Managing Vulnerabilities
- 3 Hacking the Planet, the Dalai Lama, and You
- 4 The New CyberWarfare
- 5 Risky Business
- Part III The Law, Politics, and Promise of Cyber Peace
- Appendix
- Index
4 - The New CyberWarfare
Securing Critical National Infrastructurein the Digital Age
from Part II - Managing Vulnerabilities
Published online by Cambridge University Press: 05 June 2014
- Managing Cyber Attacks in International Law, Business, and Relations
- Managing Cyber Attacks in International Law, Business, and Relations
- Copyright page
- Dedication
- Dedication
- Contents
- Tables and Figures
- Foreword
- Preface
- Acknowledgments
- Abbreviations
- Part I Foundations of Polycentric Governance in Cyberspace
- Part II Managing Vulnerabilities
- 3 Hacking the Planet, the Dalai Lama, and You
- 4 The New CyberWarfare
- 5 Risky Business
- Part III The Law, Politics, and Promise of Cyber Peace
- Appendix
- Index
Summary
- Type
- Chapter
- Information
- Managing Cyber Attacks in International Law, Business, and RelationsIn Search of Cyber Peace, pp. 151 - 196Publisher: Cambridge University PressPrint publication year: 2014