000 05562nam a22002417a 4500
999 _c45582
_d45582
003 VITAP
005 20230914101101.0
008 230914b ||||| |||| 00| 0 eng d
020 _a9781107416994
040 _cVITAP
082 _223rd Ed.
_a341.63 HAR
100 _913280
_aHarrison Dinniss, Heather
245 _aCyber Warfare and the Laws of War /
_cHeather Harrison Dinniss
250 _a1st Ed.
260 _aNew York, USA
_bCambridge University Press
_c2012
300 _axix, 331p. : ill. ; 23cm
440 _913281
_aCambridge Studies in International and Comparative Law
504 _aIt includes Contents, Acknowledgements, Table of cases, List of Abbreviations, appendix, Bibliography and Index Pages etc..
521 _a Book description The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyber Warfare and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states and discusses the threshold issues of force and armed attack by examining the permitted responses against such attacks. The second part offers a comprehensive analysis of the applicability of international humanitarian law to computer network attacks. By examining the legal framework regulating these attacks, Heather Harrison Dinniss addresses the issues associated with this method of attack in terms of the current law and explores the underlying debates which are shaping the modern laws applicable in armed conflict. Select Cyber Warfare and the Laws of War - Half title page Cyber Warfare and the Laws of War - Half title page pp i-i Get access Export citation Select Series page Series page pp ii-ii Get access Export citation Select Cyber Warfare and the Laws of War - Title page Cyber Warfare and the Laws of War - Title page pp iii-iii By Heather Harrison Dinniss Get access Export citation Select Copyright page Copyright page pp iv-iv Get access Export citation Select Dedication Dedication pp v-vi Get access Export citation Select Contents Contents pp vii-x Get access Export citation Select Acknowledgements Acknowledgements pp xi-xii Get access Export citation Select Table of cases Table of cases pp xiii-xv Get access Export citation Select List of abbreviations List of abbreviations pp xvi-xx Get access Export citation Select 1 - The world in which we live and fight 1 - The world in which we live and fight pp 1-34 Get access Export citation Select Part I - Jus ad bellum Part I - Jus ad bellum pp 35-114 Get access Export citation Select 2 - Computer network attacks as a use of force in international law 2 - Computer network attacks as a use of force in international law pp 37-74 Get access Export citation Select 3 - Armed attack and response in the digital age 3 - Armed attack and response in the digital age pp 75-114 Get access Export citation Select Part II - Jus in bello Part II - Jus in bello pp 115-280 Get access Export citation Select 4 - The applicability of the laws of armed conflict to computer network attacks 4 - The applicability of the laws of armed conflict to computer network attacks pp 117-138 Get access Export citation Select 5 - Participants in conflict: combatant status, direct participation and computer network attack 5 - Participants in conflict: combatant status, direct participation and computer network attack pp 139-178 Get access Export citation Select 6 - Targeting and precautions in attack 6 - Targeting and precautions in attack pp 179-219 Get access Export citation Select 7 - Measures of special protection 7 - Measures of special protection pp 220-249 Get access Export citation Select 8 - Means and methods of warfare 8 - Means and methods of warfare pp 250-278 Get access Export citation Select Concluding remarks Concluding remarks pp 279-280 Get access Export citation Select Appendix 1 - Selected computer network attack examples Appendix 1 - Selected computer network attack examples pp 281-292 Get access Export citation Select Appendix 2 - Glossary of selected computing terms<span class='sup'>1</span> Appendix 2 - Glossary of selected computing terms1 pp 293-296 Get access Export citation Select Bibliography Bibliography pp 297-320 Get access Export citation Select Index Index pp 321-331
650 0 _913283
_aInformation Warfare (International Law); War (International Law); Cyberterrorism
856 _uhttps://www.cambridge.org/core/books/cyber-warfare-and-the-laws-of-war/8B7754F0551FA9E7506DA7A85763CAD8#fndtn-information
942 _2ddc
_cREF
_e23rd Ed.
_h341.63
_mHAR