Cyber Warfare and the Laws of War / (Record no. 45582)

MARC details
000 -LEADER
fixed length control field 05562nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field VITAP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230914101101.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230914b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781107416994
040 ## - CATALOGING SOURCE
Transcribing agency VITAP
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23rd Ed.
Classification number 341.63 HAR
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 13280
Personal name Harrison Dinniss, Heather
245 ## - TITLE STATEMENT
Title Cyber Warfare and the Laws of War /
Statement of responsibility, etc. Heather Harrison Dinniss
250 ## - EDITION STATEMENT
Edition statement 1st Ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. New York, USA
Name of publisher, distributor, etc. Cambridge University Press
Date of publication, distribution, etc. 2012
300 ## - PHYSICAL DESCRIPTION
Extent xix, 331p. : ill. ; 23cm
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE
9 (RLIN) 13281
Title Cambridge Studies in International and Comparative Law
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note It includes Contents, Acknowledgements, Table of cases, List of Abbreviations, appendix, Bibliography and Index Pages etc..
521 ## - TARGET AUDIENCE NOTE
Target audience note <br/>Book description<br/><br/>The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states and discusses the threshold issues of force and armed attack by examining the permitted responses against such attacks. The second part offers a comprehensive analysis of the applicability of international humanitarian law to computer network attacks. By examining the legal framework regulating these attacks, Heather Harrison Dinniss addresses the issues associated with this method of attack in terms of the current law and explores the underlying debates which are shaping the modern laws applicable in armed conflict.<br/><br/><br/>Select Cyber Warfare and the Laws of War - Half title page<br/><br/> Cyber Warfare and the Laws of War - Half title page<br/> pp i-i<br/> Get access<br/> Export citation<br/><br/>Select Series page<br/><br/> Series page<br/> pp ii-ii<br/> Get access<br/> Export citation<br/><br/>Select Cyber Warfare and the Laws of War - Title page<br/><br/> Cyber Warfare and the Laws of War - Title page<br/> pp iii-iii<br/> By Heather Harrison Dinniss<br/> Get access<br/> Export citation<br/><br/>Select Copyright page<br/><br/> Copyright page<br/> pp iv-iv<br/> Get access<br/> Export citation<br/><br/>Select Dedication<br/><br/> Dedication<br/> pp v-vi<br/> Get access<br/> Export citation<br/><br/>Select Contents<br/><br/> Contents<br/> pp vii-x<br/> Get access<br/> Export citation<br/><br/>Select Acknowledgements<br/><br/> Acknowledgements<br/> pp xi-xii<br/> Get access<br/> Export citation<br/><br/>Select Table of cases<br/><br/> Table of cases<br/> pp xiii-xv<br/> Get access<br/> Export citation<br/><br/>Select List of abbreviations<br/><br/> List of abbreviations<br/> pp xvi-xx<br/> Get access<br/> Export citation<br/><br/>Select 1 - The world in which we live and fight<br/><br/> 1 - The world in which we live and fight<br/> pp 1-34<br/> Get access<br/> Export citation<br/><br/>Select Part I - Jus ad bellum<br/><br/> Part I - Jus ad bellum<br/> pp 35-114<br/> Get access<br/> Export citation<br/><br/>Select 2 - Computer network attacks as a use of force in international law<br/><br/> 2 - Computer network attacks as a use of force in international law<br/> pp 37-74<br/> Get access<br/> Export citation<br/><br/>Select 3 - Armed attack and response in the digital age<br/><br/> 3 - Armed attack and response in the digital age<br/> pp 75-114<br/> Get access<br/> Export citation<br/><br/>Select Part II - Jus in bello<br/><br/> Part II - Jus in bello<br/> pp 115-280<br/> Get access<br/> Export citation<br/><br/>Select 4 - The applicability of the laws of armed conflict to computer network attacks<br/><br/> 4 - The applicability of the laws of armed conflict to computer network attacks<br/> pp 117-138<br/> Get access<br/> Export citation<br/><br/>Select 5 - Participants in conflict: combatant status, direct participation and computer network attack<br/><br/> 5 - Participants in conflict: combatant status, direct participation and computer network attack<br/> pp 139-178<br/> Get access<br/> Export citation<br/><br/>Select 6 - Targeting and precautions in attack<br/><br/> 6 - Targeting and precautions in attack<br/> pp 179-219<br/> Get access<br/> Export citation<br/><br/>Select 7 - Measures of special protection<br/><br/> 7 - Measures of special protection<br/> pp 220-249<br/> Get access<br/> Export citation<br/><br/>Select 8 - Means and methods of warfare<br/><br/> 8 - Means and methods of warfare<br/> pp 250-278<br/> Get access<br/> Export citation<br/><br/>Select Concluding remarks<br/><br/> Concluding remarks<br/> pp 279-280<br/> Get access<br/> Export citation<br/><br/>Select Appendix 1 - Selected computer network attack examples<br/><br/> Appendix 1 - Selected computer network attack examples<br/> pp 281-292<br/> Get access<br/> Export citation<br/><br/>Select Appendix 2 - Glossary of selected computing terms<span class='sup'>1</span><br/><br/> Appendix 2 - Glossary of selected computing terms1<br/> pp 293-296<br/> Get access<br/> Export citation<br/><br/>Select Bibliography<br/><br/> Bibliography<br/> pp 297-320<br/> Get access<br/> Export citation<br/><br/>Select Index<br/><br/> Index<br/> pp 321-331<br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 13283
Topical term or geographic name entry element Information Warfare (International Law); War (International Law); Cyberterrorism
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www.cambridge.org/core/books/cyber-warfare-and-the-laws-of-war/8B7754F0551FA9E7506DA7A85763CAD8#fndtn-information">https://www.cambridge.org/core/books/cyber-warfare-and-the-laws-of-war/8B7754F0551FA9E7506DA7A85763CAD8#fndtn-information</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Reference Book
Edition 23rd Ed.
Classification part 341.63
Call number suffix HAR
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Copy number Cost, replacement price Price effective from Koha item type Public note
    Dewey Decimal Classification Paper Back     VIT AP School of Law VIT AP School of Law LAW Section 2023-09-07 Deccan Law House 3430.96 4036   341.63 HAR 021159 2023-09-14 LA02253 3430.96 2023-09-14 Reference Book LAW

Visitor Number:

Powered by Koha