000 | 01086cam a2200205 4500 | ||
---|---|---|---|
020 |
_a9781442259027 (pbk.): _c40.00USD |
||
100 | 1 | _aJUN Jenny | |
245 |
_aNorth Korea's cyber operations : _bstrategy and responses / _cJenny Jun, Scott LaFoy and Ethan Sohn ; project directors, Victor D. Cha, James A. Lewis. |
||
260 |
_aWashington: _bCentre For Strategy and Intelligence Study, _c2015. |
||
400 | _aCSIS reports | ||
504 | _aIncludes bibliographical references. | ||
500 | _a"A report of the CSIS Korea Chair." | ||
520 | _aNorth Korea is emerging as a significant actor in cyberspace with both its military and clandestine organizations gaining the ability to conduct cyber operations. However, there is no comprehensive standard literature about North Korea's cyber capabilities that takes an integrated view of the topic. | ||
650 |
_aCYBERSPACE OPERATIONS(MILITARY SCIENCE) _x KOREA(NORTH) |
||
650 |
_aCYBERTERRORISM _x PREVENTION |
||
650 |
_aCOMPUTER NETWORKS _x SECURITY MEASURES |
||
700 | _aLAFOY Scott | ||
700 | _aSOHN Ethan | ||
945 |
_i54929-1001 _rY _sY |
||
999 |
_c33117 _d33117 |