Cyberspace, where information―and hence serious value―is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace...

Buy Now From Amazon

Cyberspace, where information―and hence serious value―is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.

  • Used Book in Good Condition
  • Used Book in Good Condition

Similar Products

Psychology and Deterrence (Perspectives on Security)Competitive Strategies for the 21st Century: Theory, History, and Practice (Stanford Security Studies)The Challenge of Nuclear-Armed Regional AdversariesCommand and Control: Nuclear Weapons, the Damascus Accident, and the Illusion of SafetyEvery War Must End (Columbia Classics (Paperback))On Limited Nuclear War in the 21st CenturyArms and Influence: With a New Preface and Afterword (The Henry L. Stimson Lectures Series)Cybersecurity and Cyberwar: What Everyone Needs to Know®