Cyber Operations and International Law / (Record no. 45583)

MARC details
000 -LEADER
fixed length control field 06822nam a22002417a 4500
003 - CONTROL NUMBER IDENTIFIER
control field VITAP
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230914102729.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 230914b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781108748353
040 ## - CATALOGING SOURCE
Transcribing agency VITAP
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23rd Ed.
Classification number 341.63 DEL
100 ## - MAIN ENTRY--PERSONAL NAME
9 (RLIN) 13285
Personal name Delerue, Francois
245 ## - TITLE STATEMENT
Title Cyber Operations and International Law /
Statement of responsibility, etc. Francois Delerue
250 ## - EDITION STATEMENT
Edition statement 1st Ed.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Cambridge, United Kingdom
Name of publisher, distributor, etc. Cambridge University Press
Date of publication, distribution, etc. 2020
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 513p. : ill. ; 23cm
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE
9 (RLIN) 13286
Title Cambridge Studies in International and Comparative Law
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note It includes List of Abbreviations, Contents, Conclusions, Appendix, Selected Bibliography and Index Pages etc..
521 ## - TARGET AUDIENCE NOTE
Target audience note Book description:<br/><br/>This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting its limits in resolving issues related to cyber operations. There are several situations in which international law leaves the victim State of cyber operations helpless. Two main streams of limits are identified. First, in the case of cyber operations conducted by non-state actors on the behalf of a State, new technologies offer various ways to coordinate cyber operations without a high level of organization. Second, the law of State responsibility offers a range of solutions to respond to cyber operations and seek reparation, but it does not provide an answer in every case and it cannot solve the problem related to technical capabilities of the victim.<br/><br/>Table of Contents:<br/><br/><br/><br/> Cyber Operations and International Law<br/> pp i-i<br/> Get access<br/> Export citation<br/><br/>Select Cambridge Studies in International and Comparative Law: 146 - Series page<br/><br/> Cambridge Studies in International and Comparative Law: 146 - Series page<br/> pp ii-ii<br/> Get access<br/> Export citation<br/><br/>Select Cyber Operations and International Law - Title page<br/><br/> Cyber Operations and International Law - Title page<br/> pp iii-iii<br/> Get access<br/> Export citation<br/><br/>Select Copyright page<br/><br/> Copyright page<br/> pp iv-iv<br/> Get access<br/> Export citation<br/><br/>Select Contents<br/><br/> Contents<br/> pp v-xviii<br/> Get access<br/> Export citation<br/><br/>Select Abbreviations<br/><br/> Abbreviations<br/> pp xix-xxii<br/> Get access<br/> Export citation<br/><br/>Select 1 - Does International Law Matter in Cyberspace?<br/><br/> 1 - Does International Law Matter in Cyberspace?<br/> pp 1-50<br/> Get access<br/> Export citation<br/><br/>Select Part I - Attribution<br/><br/> Part I - Attribution<br/> pp 51-190<br/> Get access<br/> Export citation<br/><br/>Select 2 - Attribution to a Machine or a Human: A Technical Process<br/><br/> 2 - Attribution to a Machine or a Human: A Technical Process<br/> pp 55-86<br/> Get access<br/> Export citation<br/><br/>Select 3 - The Question of Evidence: From Technical to Legal Attribution<br/><br/> 3 - The Question of Evidence: From Technical to Legal Attribution<br/> pp 87-110<br/> Get access<br/> Export citation<br/><br/>Select 4 - Attribution to a State<br/><br/> 4 - Attribution to a State<br/> pp 111-188<br/> Get access<br/> Export citation<br/><br/>Select Part I – Conclusion<br/><br/> Part I – Conclusion<br/> pp 189-190<br/> Get access<br/> Export citation<br/><br/>Select Part II - The Lawfulness of Cyber Operations<br/><br/> Part II - The Lawfulness of Cyber Operations<br/> pp 191-378<br/> Get access<br/> Export citation<br/><br/>Select 5 - Internationally Wrongful Cyber Acts: Cyber Operations Breaching Norms of International Law<br/><br/> 5 - Internationally Wrongful Cyber Acts: Cyber Operations Breaching Norms of International Law<br/> pp 193-272<br/> Get access<br/> Export citation<br/><br/>Select 6 - The Threshold of Cyber Warfare: from Use of Cyber Force to Cyber Armed Attack<br/><br/> 6 - The Threshold of Cyber Warfare: from Use of Cyber Force to Cyber Armed Attack<br/> pp 273-342<br/> Get access<br/> Export citation<br/><br/>Select 7 - Circumstances Precluding or Attenuating the Wrongfulness of Unlawful Cyber Operations<br/><br/> 7 - Circumstances Precluding or Attenuating the Wrongfulness of Unlawful Cyber Operations<br/> pp 343-352<br/> Get access<br/> Export citation<br/><br/>Select 8 - Cyber Operations and the Principle of Due Diligence<br/><br/> 8 - Cyber Operations and the Principle of Due Diligence<br/> pp 353-376<br/> Get access<br/> Export citation<br/><br/>Select Part II – Conclusion<br/><br/> Part II – Conclusion<br/> pp 377-378<br/> Get access<br/> Export citation<br/><br/>Select Part III - Remedies against State-Sponsored Cyber Operations<br/><br/> Part III - Remedies against State-Sponsored Cyber Operations<br/> pp 379-492<br/> Get access<br/> Export citation<br/><br/>Select 9 - State Responsibility and the Consequences of an Internationally Wrongful Cyber Operation<br/><br/> 9 - State Responsibility and the Consequences of an Internationally Wrongful Cyber Operation<br/> pp 381-422<br/> Get access<br/> Export citation<br/><br/>Select 10 - Measures of Self-Help against State-Sponsored Cyber Operations<br/><br/> 10 - Measures of Self-Help against State-Sponsored Cyber Operations<br/> pp 423-490<br/> Get access<br/> Export citation<br/><br/>Select Part III – Conclusion<br/><br/> Part III – Conclusion<br/> pp 491-492<br/> Get access<br/> Export citation<br/><br/>Select 11 - Conclusion<br/><br/> 11 - Conclusion<br/> pp 493-498<br/> Get access<br/> Export citation<br/><br/>Select Appendix - Table Assessing the Lawfulness of Cyber Operations and Potential Responses<br/><br/> Appendix - Table Assessing the Lawfulness of Cyber Operations and Potential Responses<br/> pp 499-501<br/> Get access<br/> Export citation<br/><br/>Select Select Bibliography<br/><br/> Select Bibliography<br/> pp 502-508<br/> Get access<br/> Export citation<br/><br/>Select Index<br/><br/> Index<br/> pp 509-513<br/> Get access<br/> Export citation<br/><br/>Select Cambridge Studies in International and Comparative Law - Series page<br/><br/> Cambridge Studies in International and Comparative Law - Series page<br/> pp 514-522<br/><br/>
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
9 (RLIN) 13290
Topical term or geographic name entry element Cyberspace operations (Military science); Aggression (International law); International law; Cyberspace operations (International law); Cyberterrorism--Law and legislation
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://www.cambridge.org/core/books/cyber-operations-and-international-law/74D210E76E46531542AD27CECF07ABDE#fndtn-information">https://www.cambridge.org/core/books/cyber-operations-and-international-law/74D210E76E46531542AD27CECF07ABDE#fndtn-information</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Reference Book
Edition 23rd Ed.
Classification part 341.63
Call number suffix DEL
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Materials specified (bound volume or other part) Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Cost, normal purchase price Inventory number Total Checkouts Full call number Barcode Date last seen Date last checked out Copy number Cost, replacement price Price effective from Koha item type Public note
    Dewey Decimal Classification Paper Back     VIT AP School of Law VIT AP School of Law LAW Section 2023-09-07 Deccan Law House 3118.96 4036 1 341.63 DEL 021160 2024-01-20 2023-12-23 LA02254 3118.96 2023-09-14 Text Book LAW

Visitor Number:

Powered by Koha