{"@context":{"owl":"http://www.w3.org/2002/07/owl#","bibo":"http://purl.org/ontology/bibo/","foaf":"http://xmlns.com/foaf/0.1/","rdfs":"http://www.w3.org/2000/01/rdf-schema#","prism":"http://prismstandard.org/namespaces/basic/2.0/","cinii":"http://ci.nii.ac.jp/ns/1.0/","dc":"http://purl.org/dc/elements/1.1/","dcterms":"http://purl.org/dc/terms/"},"@id":"https://ci.nii.ac.jp/ncid/BC1256816X.json","@graph":[{"@id":"https://ci.nii.ac.jp/ncid/BC1256816X#entity","@type":"bibo:Book","foaf:isPrimaryTopicOf":{"@id":"https://ci.nii.ac.jp/ncid/BC1256816X.json"},"dc:title":[{"@value":"The United States' Defend Forward cyber strategy : a comprehensive legal assessment"}],"dc:creator":"edited by Jack Goldsmith","dc:publisher":[{"@value":"Oxford University Press"}],"dcterms:extent":"xiii, 357 p.","cinii:size":"24 cm","dc:language":"eng","dc:date":"2022","cinii:ncid":"BC1256816X","cinii:ownerCount":"1","foaf:maker":[{"@id":"https://ci.nii.ac.jp/author/DA13940009#entity","@type":"foaf:Person","foaf:name":[{"@value":"Goldsmith, Jack L."}]}],"bibo:owner":[{"@id":"https://ci.nii.ac.jp/library/FA018371","@type":"foaf:Organization","foaf:name":"政策研究大学院大学 図書館","rdfs:seeAlso":{"@id":"http://glib.grips.ac.jp/mylimedio/search/search.do?target=local&mode=comp&ncid=BC1256816X"}}],"bibo:lccn":["2023298266"],"rdfs:seeAlso":[{"@id":"https://lccn.loc.gov/2023298266"}],"prism:publicationDate":["c2022"],"cinii:note":["Includes bibliographical references and index"],"dc:subject":["DC23:342.730858","LCC:KF390.5.C6"],"foaf:topic":[{"@id":"https://ci.nii.ac.jp/books/search?q=Cyberspace+operations+%28Military+science%29+--+United+States","dc:title":"Cyberspace operations (Military science) -- United States"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security+--+Law+and+legislation+--+United+States","dc:title":"Computer security -- Law and legislation -- United States"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security+--+Government+policy+--+United+States","dc:title":"Computer security -- Government policy -- United States"},{"@id":"https://ci.nii.ac.jp/books/search?q=Cyberinfrastructure+--+Security+measures+--+Law+and+legislation+--+United+States","dc:title":"Cyberinfrastructure -- Security measures -- Law and legislation -- United States"},{"@id":"https://ci.nii.ac.jp/books/search?q=Cyberinfrastructure+--+Security+measures+--+Government+policy+--+United+States","dc:title":"Cyberinfrastructure -- Security measures -- Government policy -- United States"},{"@id":"https://ci.nii.ac.jp/books/search?q=S%C3%A9curit%C3%A9+informatique+--+Politique+gouvernementale+--+%C3%89tats-Unis","dc:title":"Sécurité informatique -- Politique gouvernementale -- États-Unis"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security+--+Government+policy+fast","dc:title":"Computer security -- Government policy fast"},{"@id":"https://ci.nii.ac.jp/books/search?q=Computer+security+--+Law+and+legislation+fast","dc:title":"Computer security -- Law and legislation fast"},{"@id":"https://ci.nii.ac.jp/books/search?q=Law+ukslc","dc:title":"Law ukslc"},{"@id":"https://ci.nii.ac.jp/books/search?q=United+States+fast","dc:title":"United States fast"}],"dcterms:hasPart":[{"@id":"urn:isbn:9780197601808","dc:title":": pbk"}]}]}