Home
TERRORISM: COMMENTARY ON SECURITY DOCUMENTS VOLUME 140: The Cyber Threat

TERRORISM: COMMENTARY ON SECURITY DOCUMENTS VOLUME 140: The Cyber Threat in Bloomington, MN
Current price: $130.00
Loading Inventory...
Size: OS
Terrorism: Commentary on Security Documents
is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 140,
The Cyber Threat
considers U.S. policy in relation to cybersecurity and cyberterrorism, and examines opposing views on cybersecurity and international law by nations such as Russia and China.
The documents in this volume include testimony of FBI officials before Congressional committees, as well as detailed reports from the Strategic Studies Institute/U.S. Army War College Press and from the Congressional Research Service. The detailed studies in this volume tackling the core issues of cybersecurity and cyberterrorism include:
Legality in Cyberspace; An Adversary View
and
Distinguishing Acts of War in Cyberspace
; and
Assessment Criteria, Policy Considerations, and Response Implications
.
is a series that provides primary source documents and expert commentary on various topics relating to the worldwide effort to combat terrorism, as well as efforts by the United States and other nations to protect their national security interests. Volume 140,
The Cyber Threat
considers U.S. policy in relation to cybersecurity and cyberterrorism, and examines opposing views on cybersecurity and international law by nations such as Russia and China.
The documents in this volume include testimony of FBI officials before Congressional committees, as well as detailed reports from the Strategic Studies Institute/U.S. Army War College Press and from the Congressional Research Service. The detailed studies in this volume tackling the core issues of cybersecurity and cyberterrorism include:
Legality in Cyberspace; An Adversary View
and
Distinguishing Acts of War in Cyberspace
; and
Assessment Criteria, Policy Considerations, and Response Implications
.