MARC details
000 -LEADER |
fixed length control field |
05562nam a22002417a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
VITAP |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230914101101.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230914b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781107416994 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
VITAP |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
23rd Ed. |
Classification number |
341.63 HAR |
100 ## - MAIN ENTRY--PERSONAL NAME |
9 (RLIN) |
13280 |
Personal name |
Harrison Dinniss, Heather |
245 ## - TITLE STATEMENT |
Title |
Cyber Warfare and the Laws of War / |
Statement of responsibility, etc. |
Heather Harrison Dinniss |
250 ## - EDITION STATEMENT |
Edition statement |
1st Ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
New York, USA |
Name of publisher, distributor, etc. |
Cambridge University Press |
Date of publication, distribution, etc. |
2012 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xix, 331p. : ill. ; 23cm |
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE |
9 (RLIN) |
13281 |
Title |
Cambridge Studies in International and Comparative Law |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
It includes Contents, Acknowledgements, Table of cases, List of Abbreviations, appendix, Bibliography and Index Pages etc.. |
521 ## - TARGET AUDIENCE NOTE |
Target audience note |
<br/>Book description<br/><br/>The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states and discusses the threshold issues of force and armed attack by examining the permitted responses against such attacks. The second part offers a comprehensive analysis of the applicability of international humanitarian law to computer network attacks. By examining the legal framework regulating these attacks, Heather Harrison Dinniss addresses the issues associated with this method of attack in terms of the current law and explores the underlying debates which are shaping the modern laws applicable in armed conflict.<br/><br/><br/>Select Cyber Warfare and the Laws of War - Half title page<br/><br/> Cyber Warfare and the Laws of War - Half title page<br/> pp i-i<br/> Get access<br/> Export citation<br/><br/>Select Series page<br/><br/> Series page<br/> pp ii-ii<br/> Get access<br/> Export citation<br/><br/>Select Cyber Warfare and the Laws of War - Title page<br/><br/> Cyber Warfare and the Laws of War - Title page<br/> pp iii-iii<br/> By Heather Harrison Dinniss<br/> Get access<br/> Export citation<br/><br/>Select Copyright page<br/><br/> Copyright page<br/> pp iv-iv<br/> Get access<br/> Export citation<br/><br/>Select Dedication<br/><br/> Dedication<br/> pp v-vi<br/> Get access<br/> Export citation<br/><br/>Select Contents<br/><br/> Contents<br/> pp vii-x<br/> Get access<br/> Export citation<br/><br/>Select Acknowledgements<br/><br/> Acknowledgements<br/> pp xi-xii<br/> Get access<br/> Export citation<br/><br/>Select Table of cases<br/><br/> Table of cases<br/> pp xiii-xv<br/> Get access<br/> Export citation<br/><br/>Select List of abbreviations<br/><br/> List of abbreviations<br/> pp xvi-xx<br/> Get access<br/> Export citation<br/><br/>Select 1 - The world in which we live and fight<br/><br/> 1 - The world in which we live and fight<br/> pp 1-34<br/> Get access<br/> Export citation<br/><br/>Select Part I - Jus ad bellum<br/><br/> Part I - Jus ad bellum<br/> pp 35-114<br/> Get access<br/> Export citation<br/><br/>Select 2 - Computer network attacks as a use of force in international law<br/><br/> 2 - Computer network attacks as a use of force in international law<br/> pp 37-74<br/> Get access<br/> Export citation<br/><br/>Select 3 - Armed attack and response in the digital age<br/><br/> 3 - Armed attack and response in the digital age<br/> pp 75-114<br/> Get access<br/> Export citation<br/><br/>Select Part II - Jus in bello<br/><br/> Part II - Jus in bello<br/> pp 115-280<br/> Get access<br/> Export citation<br/><br/>Select 4 - The applicability of the laws of armed conflict to computer network attacks<br/><br/> 4 - The applicability of the laws of armed conflict to computer network attacks<br/> pp 117-138<br/> Get access<br/> Export citation<br/><br/>Select 5 - Participants in conflict: combatant status, direct participation and computer network attack<br/><br/> 5 - Participants in conflict: combatant status, direct participation and computer network attack<br/> pp 139-178<br/> Get access<br/> Export citation<br/><br/>Select 6 - Targeting and precautions in attack<br/><br/> 6 - Targeting and precautions in attack<br/> pp 179-219<br/> Get access<br/> Export citation<br/><br/>Select 7 - Measures of special protection<br/><br/> 7 - Measures of special protection<br/> pp 220-249<br/> Get access<br/> Export citation<br/><br/>Select 8 - Means and methods of warfare<br/><br/> 8 - Means and methods of warfare<br/> pp 250-278<br/> Get access<br/> Export citation<br/><br/>Select Concluding remarks<br/><br/> Concluding remarks<br/> pp 279-280<br/> Get access<br/> Export citation<br/><br/>Select Appendix 1 - Selected computer network attack examples<br/><br/> Appendix 1 - Selected computer network attack examples<br/> pp 281-292<br/> Get access<br/> Export citation<br/><br/>Select Appendix 2 - Glossary of selected computing terms<span class='sup'>1</span><br/><br/> Appendix 2 - Glossary of selected computing terms1<br/> pp 293-296<br/> Get access<br/> Export citation<br/><br/>Select Bibliography<br/><br/> Bibliography<br/> pp 297-320<br/> Get access<br/> Export citation<br/><br/>Select Index<br/><br/> Index<br/> pp 321-331<br/> |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
13283 |
Topical term or geographic name entry element |
Information Warfare (International Law); War (International Law); Cyberterrorism |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://www.cambridge.org/core/books/cyber-warfare-and-the-laws-of-war/8B7754F0551FA9E7506DA7A85763CAD8#fndtn-information">https://www.cambridge.org/core/books/cyber-warfare-and-the-laws-of-war/8B7754F0551FA9E7506DA7A85763CAD8#fndtn-information</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Reference Book |
Edition |
23rd Ed. |
Classification part |
341.63 |
Call number suffix |
HAR |