<?xml version="1.0" encoding="UTF-8"?>
<collection xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.loc.gov/MARC21/slim http://www.loc.gov/standards/marcxml/schema/MARC21slim.xsd" xmlns="http://www.loc.gov/MARC21/slim">
 <record>
  <leader>00000nam a2200000 i 4500</leader>
  <controlfield tag="001">UP-1686042739785060016</controlfield>
  <controlfield tag="003">Buklod</controlfield>
  <controlfield tag="005">20241203163533.0</controlfield>
  <controlfield tag="006">m    |o  d |      </controlfield>
  <controlfield tag="007">ta</controlfield>
  <controlfield tag="008">241120t20222022nyu        u        eng c</controlfield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">0197601790 (eBook)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">0197601804 (eBook)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9780197601792  (eBook)</subfield>
  </datafield>
  <datafield tag="020" ind1=" " ind2=" ">
   <subfield code="a">9780197601808 (eBook)</subfield>
  </datafield>
  <datafield tag="035" ind1=" " ind2=" ">
   <subfield code="a">23326567</subfield>
  </datafield>
  <datafield tag="040" ind1=" " ind2=" ">
   <subfield code="a">DLC</subfield>
   <subfield code="d">DLAW</subfield>
   <subfield code="e">rda</subfield>
  </datafield>
  <datafield tag="041" ind1="0" ind2=" ">
   <subfield code="a">eng</subfield>
  </datafield>
  <datafield tag="084" ind1=" " ind2=" ">
   <subfield code="a">KF 390.5.C6 </subfield>
   <subfield code="b">U64 2022eb</subfield>
  </datafield>
  <datafield tag="245" ind1="0" ind2="4">
   <subfield code="a">The United States' Defend Forward cyber strategy</subfield>
   <subfield code="b">a comprehensive legal assessment</subfield>
   <subfield code="c">edited by Jack Goldsmith.</subfield>
   <subfield code="h">Electronic resources.</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="c">©2022</subfield>
  </datafield>
  <datafield tag="264" ind1=" " ind2="1">
   <subfield code="a">New York, NY</subfield>
   <subfield code="b">Oxford University Press</subfield>
   <subfield code="c">[2022]</subfield>
  </datafield>
  <datafield tag="300" ind1=" " ind2=" ">
   <subfield code="a">1 online resource (xiii, 357 pages)</subfield>
   <subfield code="c">24 cm</subfield>
  </datafield>
  <datafield tag="336" ind1=" " ind2=" ">
   <subfield code="a">text</subfield>
   <subfield code="b">txt</subfield>
   <subfield code="2">rdacontent</subfield>
  </datafield>
  <datafield tag="337" ind1=" " ind2=" ">
   <subfield code="a">computer</subfield>
   <subfield code="2">rdamedia</subfield>
  </datafield>
  <datafield tag="338" ind1=" " ind2=" ">
   <subfield code="a">online resource</subfield>
   <subfield code="b">nc</subfield>
   <subfield code="2">rdacarrier</subfield>
  </datafield>
  <datafield tag="504" ind1=" " ind2=" ">
   <subfield code="a">Includes bibliographical references and index.</subfield>
  </datafield>
  <datafield tag="505" ind1="0" ind2=" ">
   <subfield code="a">efend Forward and persistent engagement / Gary P. Corn and Emily Goldman -- Scenarios for Defend Forward / Gary P. Corn and Peter Renals -- US Cyber Command's first decade / Michael Warner -- The domestic legal framework for US military cyber operations / Robert M. Chesney -- Cyberattacks and constitutional powers / Matthew C. Waxman -- Defend forward and the FBI / James Baker and Matt Morris -- Defend Forward and sovereignty / Jack Goldsmith and Alex Loomis -- Defend Forward and cyber countermeasures / Ashley Deeks -- Covert deception, strategic fraud, and the rule of prohibited intervention / Gary P. Corn -- Due diligence and Defend Forward / Eric Talbot Jensen and Sean Watts -- Defend Forward and attribution / Kristen E. Eichensehr -- Persistent aggrandizement and Israel's cyber defense architecture / Elena Chachko -- Adapting to the cyber domain : Comparing US and UK institutional, legal, and policy innovations / Robert M. Chesney.</subfield>
  </datafield>
  <datafield tag="520" ind1=" " ind2=" ">
   <subfield code="a">The United States{u2019} new Defend Forward Strategy constitutes a major change in how the nation with the world{u2019}s most powerful cyber arsenal views when and how this arsenal should be deployed. It is a large step in the direction of more aggressive action in cyberspace{u2014}albeit for defensive ends. The United States has not attempted to hide this new and more aggressive cyber posture. To the contrary, it has telegraphed the change, probably in order to enhance deterrence. But the telegraphing has taken place at a highly abstract level. Very little is known about precisely what types of operations Defend Forward entails. And while the US government has asserted that Defend Forward is consistent with domestic and international law, it has not explained how the new strategy overcomes the perceived legal constraints that previously tempered US responses to cyber intrusions and threats. This volume aims to fill these gaps, and to bring Defend Forward out of the shadows, so to speak, both factually and legally.&quot;--from publisher's website.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="2">ukslc</subfield>
   <subfield code="a">Electronic books.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer security</subfield>
   <subfield code="x">Government policy</subfield>
   <subfield code="z">United States.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Computer security</subfield>
   <subfield code="x">Law and legislation</subfield>
   <subfield code="z">United States.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Sécurité informatique</subfield>
   <subfield code="x">Politique gouvernementale</subfield>
   <subfield code="z">États-Unis.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Cyberinfrastructure</subfield>
   <subfield code="x">Security measures</subfield>
   <subfield code="x">Government policy</subfield>
   <subfield code="z">United States.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">Cyberinfrastructure</subfield>
   <subfield code="x">Security measures</subfield>
   <subfield code="x">Law and legislation</subfield>
   <subfield code="z">United States.</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">puter security</subfield>
   <subfield code="x">Government policy.</subfield>
   <subfield code="2">fast</subfield>
   <subfield code="0">(OCoLC)fst00872490</subfield>
  </datafield>
  <datafield tag="650" ind1=" " ind2="0">
   <subfield code="a">puter security</subfield>
   <subfield code="x">Law and legislation.</subfield>
   <subfield code="2">fast</subfield>
   <subfield code="0">(OCoLC)fst00872492</subfield>
  </datafield>
  <datafield tag="651" ind1=" " ind2="0">
   <subfield code="a">ted States.</subfield>
   <subfield code="2">fast</subfield>
   <subfield code="0">(OCoLC)fst01204155</subfield>
  </datafield>
  <datafield tag="700" ind1="1" ind2=" ">
   <subfield code="l">Goldsmith, Jack L.</subfield>
   <subfield code="e">editor.</subfield>
  </datafield>
  <datafield tag="856" ind1="0" ind2="0">
   <subfield code="u">https://doi.org/10.1093/oso/9780197601792.001.0001</subfield>
   <subfield code="y">click here to access</subfield>
   <subfield code="z">Available to all UP Students</subfield>
   <subfield code="3">University of the Philippines, College of Law</subfield>
  </datafield>
  <datafield tag="905" ind1=" " ind2=" ">
   <subfield code="a">FO</subfield>
  </datafield>
  <datafield tag="852" ind1="0" ind2=" ">
   <subfield code="a">UPD</subfield>
   <subfield code="b">DLAW</subfield>
   <subfield code="h">KF 390.5.C6</subfield>
   <subfield code="i">U64 2022</subfield>
  </datafield>
  <datafield tag="942" ind1=" " ind2=" ">
   <subfield code="a">Electronic Resource</subfield>
  </datafield>
 </record>
</collection>
