. . . . "Text" . . "Cyberterrorisme -- Lutte contre -- \u00C9tats-Unis -- Vingt et uni\u00E8me si\u00E8cle" . . "Cyberespace -- Mesures de s\u00E9curit\u00E9 -- Vingt et uni\u00E8me si\u00E8cle" . . "Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack" . "Guerre de l'information -- \u00C9tats-Unis -- Vingt et uni\u00E8me si\u00E8cle" . "Protection civile -- \u00C9tats-Unis -- Vingt et uni\u00E8me si\u00E8cle" . . "R\u00E9seaux d'ordinateurs -- Mesures de s\u00E9curit\u00E9 -- \u00C9tats-Unis -- Vingt et uni\u00E8me si\u00E8cle" . "Cyberdeterrence and cyberwar" . . . "Cyberdeterrence and cyberwar" . . "2009" . "Cyberterrorisme -- \u00C9tats-Unis" . . . . . .