• 0Shopping Cart
LTRM
  • Home
  • Events
  • Volumes
  • Masthead
  • Editorial Board
  • Search
  • Menu Menu

Cyber Attacks and the Laws of War

$9.99

Categories: Books, Cyber Defense, Cybersecurity, Cyberwarfare, Risk Controls, State Hacking Tag: New Books
  • Description
  • Reviews (0)

Description

In 1949, John Von Neumann—a mathematician and an early architect of computing systems—presented at the University of Illinois a series of lectures called the Theory and Organization of Complicated Automata, where he explored the possibility of developing machines that self-replicate.1 Von Neumann envisioned machines that could build self-copies and pass on their programming to their progeny. While his ideas had legitimate applications, such as large-scale mining, many observers also consider it to be the theoretical precursor to the modern-day computer virus.2 Self-replication is a defining characteristic of computer viruses and worms. Through self-replication, computer code populates computer systems exponentially. Computer viruses and worms have the capacity for constructive applications, but they are most often malware—malicious software that is hostile, intrusive, and unwelcome.

Reviews

There are no reviews yet.

Be the first to review “Cyber Attacks and the Laws of War” Cancel reply

Your email address will not be published. Required fields are marked *

Related products

  • Targeting in the Cyber Domain: Legal Challenges Arising from the Application of the Principle of Distinction to Cyber Attacks

    $9.99
    Buy Book
  • A Brave New World: Applying International Law of War to Cyber-Attacks

    $9.99
    Buy Book
  • Strengthened Director Duties of Care for Cybersecurity Oversight: Evolving Expectations of Existing Legal Doctrine

    $9.99
    Buy Book
  • New Payment Methods and Insufficiencies in their Regulatory Scheme

    $9.99
    Buy Book

Newsletter

Contact Us

Sales Inquiry
​Press Inquiry
​Speaking Inquiry
Job Inquiry

Privacy Policy

About

Sponsors
Membership

Submit

Articles
Notes
Symposium Proposals

Store

Lectures

Journals/Partners

  • Global Cyber Institute
  • Journal of Law & Cyber Warfare
  • Lexeprint Inc.

Lectures – Lexeprint.com

  • Lawyer’s Guide for Advising Board Members on Cybersecurity Risk Management
  • How Lawyers Can Help Clients Manage Vendors to Protect and Mitigate the Risks of a Cyber Incident
  • Exploring the Internet of Things: Implications for the Law and the Associated Risks
© Copyright - LTRM - Enfold Theme by Kriesi
Is Uncle Sam Stalking You? Abandoning Warrantless Electronic Surveillance to... Journal of Law and Cyber Warfare – Volume 3, Issue 1
Scroll to top