Book contents
- Cyber Warfare and the Laws of War
- Series page
- Cyber Warfare and the Laws of War
- Copyright page
- Dedication
- Contents
- Acknowledgements
- Table of cases
- List of abbreviations
- 1 The world in which we live and fight
- Part I Jus ad bellum
- Part II Jus in bello
- 4 The applicability of the laws of armed conflict to computer network attacks
- 5 Participants in conflict: combatant status, direct participation and computer network attack
- 6 Targeting and precautions in attack
- 7 Measures of special protection
- 8 Means and methods of warfare
- Concluding remarks
- Appendix 1 Selected computer network attack examples
- Appendix 2 Glossary of selected computing terms1
- Bibliography
- Index
6 - Targeting and precautions in attack
from Part II - Jus in bello
Published online by Cambridge University Press: 05 August 2012
- Cyber Warfare and the Laws of War
- Series page
- Cyber Warfare and the Laws of War
- Copyright page
- Dedication
- Contents
- Acknowledgements
- Table of cases
- List of abbreviations
- 1 The world in which we live and fight
- Part I Jus ad bellum
- Part II Jus in bello
- 4 The applicability of the laws of armed conflict to computer network attacks
- 5 Participants in conflict: combatant status, direct participation and computer network attack
- 6 Targeting and precautions in attack
- 7 Measures of special protection
- 8 Means and methods of warfare
- Concluding remarks
- Appendix 1 Selected computer network attack examples
- Appendix 2 Glossary of selected computing terms1
- Bibliography
- Index
Summary
- Type
- Chapter
- Information
- Cyber Warfare and the Laws of War , pp. 179 - 219Publisher: Cambridge University PressPrint publication year: 2012