North Korea's cyber operations : strategy and responses /

North Korea is emerging as a significant actor in cyberspace with both its military and clandestine organizations gaining the ability to conduct cyber operations. However, there is no comprehensive standard literature about North Korea's cyber capabilities that takes an integrated view of the t...

Full description

Bibliographic Details
Main Authors: Jun, Jenny (Author, http://id.loc.gov/vocabulary/relators/aut), LaFoy, Scott (http://id.loc.gov/vocabulary/relators/aut), Sohn, Ethan (Author)
Other Authors: Cha, Victor D., 1961- (Project director), Lewis, James A. (Project director)
Format: Book
Language:English
Published: Washington, DC : Lanham, MD : Center for Strategic & International Studies ; Rowman & Littlefield, [2015]
Washington, DC : Lanham, Maryland : [2015]
Series:CSIS report
Subjects:
USA

Internet

Massachusetts Institute of Technology

Holdings details from Massachusetts Institute of Technology
Call Number: U163.J86 2015

Harvard University

Holdings details from Harvard University
Call Number: U163 .J86 2015

Duke University

Holdings details from Duke University
Call Number: U163 .J86 2015

Cornell University

Holdings details from Cornell University
Call Number: Oversize U163 .J86 2015 +

Columbia University

Holdings details from Columbia University
Call Number: U163 .J66 2015g

University of Pennsylvania

Holdings details from University of Pennsylvania
Call Number: U163 .J86 2015