102,00 € TTC 96,23 € hors TVA
En stock
Paiement 100% sécurisé
payments maestro mastercard visa payments
Des questions sur ce produit ? Contactez notre service clientèle

Cyber Warfare

Military Cross-Border Computer Network Operations under International Law (paperback)

Livre | 1ère édition 2014 | Monde | Johann-Christoph Woltag
Description

In the last five years the topic of cyber warfare has received much attention due to several so-called “cyber incidents” which have been qualified by many as State-sponsored cyber attacks. This book identifies rules and limits of cross-border computer network operations for which States bear the international responsibility during both peace and war. It consequently addresses questions on jus ad bellum and jus in bello in addition to State responsibility. By reference to treaty and customary international law, actual case studies (Estonia, Georgia, Stuxnet) and the Tallinn Manual, the author illustrates the applicability of current international law and argues for an obligation on the State to prevent malicious operations emanating from networks within their jurisdiction.

This book is written for academics in public international law and practitioners from the military and other public security sectors.

Fiche technique
Plus d'infos
Type de produit Livre
Format Livre broché
EAN / ISSN 9781839702358
Nom de la collection International and European law
Poids 520 g
Disponibilité En stock
Nombre de pages xviii + 314 p.
Avec exercice intégré Non
Editeur Intersentia
Langue Anglais
Date de publication 6 mai 2014
Disponible sur Strada Belgique Non
Disponible sur Strada Europe Non
Disponible sur Strada Luxembourg Non
Extraits

Téléchargements

  • Table of contents and preliminary pages
  • Introduction
  • Chapter 1. A Survey of Computer Network Operations
  • Chapter 2. The Legal Regime of Cyberspace
  • Chapter 3. Computer Network Operations Outside of Armed Conflict
  • Chapter 4. The Justified Use of Forceful Computer Network Operations
  • Chapter 5. Computer Network Operations During an International Armed Conflict
  • Chapter 6. Neutrality in Cyber Warfare
  • Computer Network Operations Restrained