Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations

Paperback Engels 2017 9781316630372
Verwachte levertijd ongeveer 8 werkdagen


Tallinn Manual 2.0 expands on the highly influential first edition by extending its coverage of the international law governing cyber operations to peacetime legal regimes. The product of a three-year follow-on project by a new group of twenty renowned international law experts, it addresses such topics as sovereignty, state responsibility, human rights, and the law of air, space, and the sea.

Tallinn Manual 2.0 identifies 154 'black letter' rules governing cyber operations and provides extensive commentary on each rule. Although Tallinn Manual 2.0 represents the views of the experts in their personal capacity, the project benefitted from the unofficial input of many states and over fifty peer reviewers.

-Revised and updated, Tallinn Manual 2.0 now covers peacetime legal regimes
-'Black letter' rules state the international law applicable to cyber warfare
-The Commentary discusses the rules and lays out their legal basis and logic


Aantal pagina's:638


Wees de eerste die een lezersrecensie schrijft!


Part I. General International Law and Cyberspace
1. Sovereignty
2. Due diligence
3. Jurisdiction
4. Law of international responsibility
5. Cyber operations not per se regulated by international law
6. International human rights law
7. Diplomatic and consular law
8. Law of the sea
9. Air law
10. Space law
11. International telecommunication law

Part II. International Peace and Security and Cyber Activities
12. Peaceful settlement
13. Prohibition of intervention
14. The use of force
15. Collective security

Part III. The Law of Cyber Armed Conflict
16. The law of armed conflict generally
17. Conduct of hostilities
18. Certain persons, objects and activities
19. Occupation
20. Neutrality

Managementboek Top 100


Populaire producten



        Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations