MARC details
000 -LEADER |
fixed length control field |
06822nam a22002417a 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
VITAP |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20230914102729.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
230914b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781108748353 |
040 ## - CATALOGING SOURCE |
Transcribing agency |
VITAP |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Edition number |
23rd Ed. |
Classification number |
341.63 DEL |
100 ## - MAIN ENTRY--PERSONAL NAME |
9 (RLIN) |
13285 |
Personal name |
Delerue, Francois |
245 ## - TITLE STATEMENT |
Title |
Cyber Operations and International Law / |
Statement of responsibility, etc. |
Francois Delerue |
250 ## - EDITION STATEMENT |
Edition statement |
1st Ed. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Cambridge, United Kingdom |
Name of publisher, distributor, etc. |
Cambridge University Press |
Date of publication, distribution, etc. |
2020 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 513p. : ill. ; 23cm |
440 ## - SERIES STATEMENT/ADDED ENTRY--TITLE |
9 (RLIN) |
13286 |
Title |
Cambridge Studies in International and Comparative Law |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
It includes List of Abbreviations, Contents, Conclusions, Appendix, Selected Bibliography and Index Pages etc.. |
521 ## - TARGET AUDIENCE NOTE |
Target audience note |
Book description:<br/><br/>This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systematic examination of attribution, lawfulness and remedies. It demonstrates the importance of countermeasures as a form of remedies and also shows the limits of international law, highlighting its limits in resolving issues related to cyber operations. There are several situations in which international law leaves the victim State of cyber operations helpless. Two main streams of limits are identified. First, in the case of cyber operations conducted by non-state actors on the behalf of a State, new technologies offer various ways to coordinate cyber operations without a high level of organization. Second, the law of State responsibility offers a range of solutions to respond to cyber operations and seek reparation, but it does not provide an answer in every case and it cannot solve the problem related to technical capabilities of the victim.<br/><br/>Table of Contents:<br/><br/><br/><br/> Cyber Operations and International Law<br/> pp i-i<br/> Get access<br/> Export citation<br/><br/>Select Cambridge Studies in International and Comparative Law: 146 - Series page<br/><br/> Cambridge Studies in International and Comparative Law: 146 - Series page<br/> pp ii-ii<br/> Get access<br/> Export citation<br/><br/>Select Cyber Operations and International Law - Title page<br/><br/> Cyber Operations and International Law - Title page<br/> pp iii-iii<br/> Get access<br/> Export citation<br/><br/>Select Copyright page<br/><br/> Copyright page<br/> pp iv-iv<br/> Get access<br/> Export citation<br/><br/>Select Contents<br/><br/> Contents<br/> pp v-xviii<br/> Get access<br/> Export citation<br/><br/>Select Abbreviations<br/><br/> Abbreviations<br/> pp xix-xxii<br/> Get access<br/> Export citation<br/><br/>Select 1 - Does International Law Matter in Cyberspace?<br/><br/> 1 - Does International Law Matter in Cyberspace?<br/> pp 1-50<br/> Get access<br/> Export citation<br/><br/>Select Part I - Attribution<br/><br/> Part I - Attribution<br/> pp 51-190<br/> Get access<br/> Export citation<br/><br/>Select 2 - Attribution to a Machine or a Human: A Technical Process<br/><br/> 2 - Attribution to a Machine or a Human: A Technical Process<br/> pp 55-86<br/> Get access<br/> Export citation<br/><br/>Select 3 - The Question of Evidence: From Technical to Legal Attribution<br/><br/> 3 - The Question of Evidence: From Technical to Legal Attribution<br/> pp 87-110<br/> Get access<br/> Export citation<br/><br/>Select 4 - Attribution to a State<br/><br/> 4 - Attribution to a State<br/> pp 111-188<br/> Get access<br/> Export citation<br/><br/>Select Part I – Conclusion<br/><br/> Part I – Conclusion<br/> pp 189-190<br/> Get access<br/> Export citation<br/><br/>Select Part II - The Lawfulness of Cyber Operations<br/><br/> Part II - The Lawfulness of Cyber Operations<br/> pp 191-378<br/> Get access<br/> Export citation<br/><br/>Select 5 - Internationally Wrongful Cyber Acts: Cyber Operations Breaching Norms of International Law<br/><br/> 5 - Internationally Wrongful Cyber Acts: Cyber Operations Breaching Norms of International Law<br/> pp 193-272<br/> Get access<br/> Export citation<br/><br/>Select 6 - The Threshold of Cyber Warfare: from Use of Cyber Force to Cyber Armed Attack<br/><br/> 6 - The Threshold of Cyber Warfare: from Use of Cyber Force to Cyber Armed Attack<br/> pp 273-342<br/> Get access<br/> Export citation<br/><br/>Select 7 - Circumstances Precluding or Attenuating the Wrongfulness of Unlawful Cyber Operations<br/><br/> 7 - Circumstances Precluding or Attenuating the Wrongfulness of Unlawful Cyber Operations<br/> pp 343-352<br/> Get access<br/> Export citation<br/><br/>Select 8 - Cyber Operations and the Principle of Due Diligence<br/><br/> 8 - Cyber Operations and the Principle of Due Diligence<br/> pp 353-376<br/> Get access<br/> Export citation<br/><br/>Select Part II – Conclusion<br/><br/> Part II – Conclusion<br/> pp 377-378<br/> Get access<br/> Export citation<br/><br/>Select Part III - Remedies against State-Sponsored Cyber Operations<br/><br/> Part III - Remedies against State-Sponsored Cyber Operations<br/> pp 379-492<br/> Get access<br/> Export citation<br/><br/>Select 9 - State Responsibility and the Consequences of an Internationally Wrongful Cyber Operation<br/><br/> 9 - State Responsibility and the Consequences of an Internationally Wrongful Cyber Operation<br/> pp 381-422<br/> Get access<br/> Export citation<br/><br/>Select 10 - Measures of Self-Help against State-Sponsored Cyber Operations<br/><br/> 10 - Measures of Self-Help against State-Sponsored Cyber Operations<br/> pp 423-490<br/> Get access<br/> Export citation<br/><br/>Select Part III – Conclusion<br/><br/> Part III – Conclusion<br/> pp 491-492<br/> Get access<br/> Export citation<br/><br/>Select 11 - Conclusion<br/><br/> 11 - Conclusion<br/> pp 493-498<br/> Get access<br/> Export citation<br/><br/>Select Appendix - Table Assessing the Lawfulness of Cyber Operations and Potential Responses<br/><br/> Appendix - Table Assessing the Lawfulness of Cyber Operations and Potential Responses<br/> pp 499-501<br/> Get access<br/> Export citation<br/><br/>Select Select Bibliography<br/><br/> Select Bibliography<br/> pp 502-508<br/> Get access<br/> Export citation<br/><br/>Select Index<br/><br/> Index<br/> pp 509-513<br/> Get access<br/> Export citation<br/><br/>Select Cambridge Studies in International and Comparative Law - Series page<br/><br/> Cambridge Studies in International and Comparative Law - Series page<br/> pp 514-522<br/><br/> |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
9 (RLIN) |
13290 |
Topical term or geographic name entry element |
Cyberspace operations (Military science); Aggression (International law); International law; Cyberspace operations (International law); Cyberterrorism--Law and legislation |
856 ## - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://www.cambridge.org/core/books/cyber-operations-and-international-law/74D210E76E46531542AD27CECF07ABDE#fndtn-information">https://www.cambridge.org/core/books/cyber-operations-and-international-law/74D210E76E46531542AD27CECF07ABDE#fndtn-information</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Dewey Decimal Classification |
Koha item type |
Reference Book |
Edition |
23rd Ed. |
Classification part |
341.63 |
Call number suffix |
DEL |