International Law (including Laws of War): Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 25: | Line 25: | ||
|Nye, Joseph||||2010||[[Cyber Power]]||Book Excerpt||Low:Technology; Low:Policy||[http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf ''Pdf''] | |Nye, Joseph||||2010||[[Cyber Power]]||Book Excerpt||Low:Technology; Low:Policy||[http://belfercenter.ksg.harvard.edu/files/cyber-power.pdf ''Pdf''] | ||
|- | |- | ||
|Schmitt, Michael N., et. al||||2004||[[Computers and War]]|||| | |Schmitt, Michael N., et. al||||2004||[[Computers and War]]||Conference Paper||Moderate:Law||[http://www.ihlresearch.org/ihl/pdfs/schmittetal.pdf ''Pdf''] | ||
|- | |- | ||
|Schmitt, Michael N.||||1999||[[Computer Network Attack and the Use of Force in International Law]]||||None|| | |Schmitt, Michael N.||||1999||[[Computer Network Attack and the Use of Force in International Law]]||||None|| |
Revision as of 14:45, 10 August 2010
TOC-> Approaches->International Law (including Laws of War)
- Subcategories: None