Bulk sales, PO's, Marketplace Items, eBooks, Apparel, and DVDs not included.
Questions About This Book?
- The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any CDs, lab manuals, study guides, etc.
- The Rental copy of this book is not guaranteed to include any supplemental materials. You may receive a brand new copy, but typically, only the book itself.
- The eBook copy of this book is not guaranteed to include any supplemental materials. Typically only the book itself is included.
Table of Contents
|Foundations of Polycentric Regulation in Cyberspace:|
|Defining the cyber threat in Internet governance|
|Who controls cyberspace? Analyzing cyberspace through polycentric governance|
|Hacking the planet, the Dalai Lama, and you: managing technical vulnerabilities in the Internet|
|The new cyberwarfare: securing critical national infrastructure in the digital age|
|Risky business: enhancing private sector cybersecurity through the competitive market|
|The Law, Politics, and Promise of Cyber Peace:|
|The law of cyber war and peace|
|Table of Contents provided by Publisher. All Rights Reserved.|