Sale!

Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (2nd Edition)

eBook details

  • Author: Michael N. Schmitt
  • File Size: 3 MB
  • Format: PDF
  • Length: 616 pages
  • Publisher: Cambridge University Press; 2nd edition
  • Publication Date: February 2, 2017
  • Language: English
  • ASIN: B01MTEI3GZ
  • ISBN-10: 1107177227
  • ISBN-13: 9781107177222

Original price was: $106.79.Current price is: $9.00.

SKU: tallinn-manual-2-0-on-the-international-law-applicable-to-cyber-operations-2nd-edition Categories: , , , , , Tags: , , , , , , ,

Description

Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (2nd Edition) eBook PDF

Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations 2nd edition expands on the highly influential 1st edition by extending its coverage of the international law governing cyber operations to peacetime legal regimes. The product of a 3-year follow-on project by a new group of 20 renowned international law experts, it addresses such topics as state responsibility, sovereignty, human rights, and the law of space, air, and the sea. Tallinn Manual 2.0 identifies 154 ‘black letter’ rules governing cyber operations and provides extensive commentary on each rule. Although Tallinn Manual 2.0 represents the views of the experts in their personal capacity, the project benefitted from the unofficial input of many states and over 50 peer reviewers.

Review

‘Appropriately named Tallinn Manual 2.0: International Law Applicable to Cyber Operations 2e, the new ebook offers a fascinating look at how far the cyber threat landscape has evolved in the less than half decade since the 1st version’s release in 2013, shifting the focus from conventional state-authorized and operated cyber warfare to the small-bore deniable cyber activities that form the majority of day-to-day cyber attacks today.’ — Kalev Leetaru, Forbes

Reviews

There are no reviews yet.

Be the first to review “Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (2nd Edition)”