Note: Supplemental materials are not guaranteed with Rental or Used book purchases.
Purchase Benefits
What is included with this book?
Foundations of Polycentric Regulation in Cyberspace: | |
Defining the cyber threat in Internet governance | |
Who controls cyberspace? Analyzing cyberspace through polycentric governance | |
Managing Vulnerabilities: | |
Hacking the planet, the Dalai Lama, and you: managing technical vulnerabilities in the Internet | |
The new cyberwarfare: securing critical national infrastructure in the digital age | |
Risky business: enhancing private sector cybersecurity through the competitive market | |
The Law, Politics, and Promise of Cyber Peace: | |
The law of cyber war and peace | |
Cyber peace | |
Table of Contents provided by Publisher. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.