Cyber attacks and international law (Record no. 3950)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 00837cam a2200157 4500 |
100 ## - MAIN ENTRY--PERSONAL NAME | |
Personal name | GROVE Gregory D |
245 00 - TITLE STATEMENT | |
Title | Cyber attacks and international law |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Date of publication, distribution, etc. | 2003 |
518 ## - DATE/TIME AND PLACE OF AN EVENT NOTE | |
Date/time and place of an event note | Entered on 08/APR/2003 |
520 3# - SUMMARY, ETC. | |
Summary, etc. | Discussion of the various measures which can be taken to counter cyber attacks. These range from passive defence (e.g. firewalls) to active defence (e.g. in-kind retaliation, use of force). Considers the legal position of escalating responses, and notes that other than vountary private and intergovernmental cooperation, diplomacy is presently the only unambiguously lawful way of dealing with illegal information attacks. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | INFORMATION WARFARE |
General subdivision | LAW |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | LAW |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | GOODMAN Seymour E |
773 ## - HOST ITEM ENTRY | |
Main entry heading | Survival: |
Related parts | Vol. 42, No 3, Autumn 2000, pp.89-103 (106) |
945 ## - LOCAL PROCESSING INFORMATION (OCLC) | |
i | 14211-1001 |
r | Y |
s | Y |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Mindef Library & Info Centre | Mindef Library & Info Centre | Journals | 12/09/2019 | LAW | 14211-1001 | 03/01/2024 | 1 | 03/01/2024 | Journal Article |