Protecting the Internet's Core (Critical Internet Protocols and Infrastructure in the Crosshairs of Geopolitics)
List Price:
$80.00
| Expected release date is Jan 19th 2027 |
- Availability: Confirm prior to ordering
- Branding: minimum 50 pieces (add’l costs below)
- Check Freight Rates (branded products only)
Branding Options (v), Availability & Lead Times
- 1-Color Imprint: $2.00 ea.
- Promo-Page Insert: $2.50 ea. (full-color printed, single-sided page)
- Belly-Band Wrap: $2.50 ea. (full-color printed)
- Set-Up Charge: $45 per decoration
- Availability: Product availability changes daily, so please confirm your quantity is available prior to placing an order.
- Branded Products: allow 10 business days from proof approval for production. Branding options may be limited or unavailable based on product design or cover artwork.
- Unbranded Products: allow 3-5 business days for shipping. All Unbranded items receive FREE ground shipping in the US. Inquire for international shipping.
- RETURNS/CANCELLATIONS: All orders, branded or unbranded, are NON-CANCELLABLE and NON-RETURNABLE once a purchase order has been received.
Product Details
Author:
Dennis Broeders, Arun Sukumar
Format:
Paperback
Pages:
376
Publisher:
MIT Press (January 19, 2027)
Imprint:
The MIT Press
Release Date:
January 19, 2027
Language:
English
Audience:
General/trade
ISBN-13:
9780262056519
ISBN-10:
0262056518
Weight:
13oz
Dimensions:
6" x 9"
File:
RandomHouse-PRH_Book_Company_PRH_PRT_Onix_delta_active_D20260419T235510_155964849-20260419.xml
Folder:
RandomHouse
List Price:
$80.00
Country of Origin:
United States
Pub Discount:
65
Series:
Information Policy
Case Pack:
24
As low as:
$61.60
Publisher Identifier:
P-RH
Discount Code:
A
QuickShip:
Yes
Overview
Why and how the foundational infrastructure and protocols that guarantee the functioning of the Internet are under threat—and what states can do to protect it.
Protecting the Internet’s Core brings together an international group of renowned scholars to advance discussions on the public core of the Internet. They tackle questions such as: What is “public” about the public core, if most critical Internet resources are governed or managed by private actors? What does protection of the core actually entail from states? Should they commit simply to refrain from cyber operations targeting core infrastructure, or do they also have certain positive obligations to monitor and stop threats that impact the Internet beyond their borders? Why have some major powers embraced the concept, while others remain reluctant to adopt it?
The world has built its digital existence on top of core logical standards and protocols, like the TCP/IP suite, the Domain Name System and routing protocols, and core physical infrastructure like subsea cables and their landing stations, DNS servers, and Internet exchange points (IXPs). It is vital that the stability and integrity of these core protocols and infrastructure are safeguarded. This is no longer a hypothetical concern, as the war in Ukraine has powerfully demonstrated. While threats to core protocols have long existed, they have acquired a heightened degree of sophistication and severity in recent years.
Protecting the Internet’s Core brings together an international group of renowned scholars to advance discussions on the public core of the Internet. They tackle questions such as: What is “public” about the public core, if most critical Internet resources are governed or managed by private actors? What does protection of the core actually entail from states? Should they commit simply to refrain from cyber operations targeting core infrastructure, or do they also have certain positive obligations to monitor and stop threats that impact the Internet beyond their borders? Why have some major powers embraced the concept, while others remain reluctant to adopt it?
The world has built its digital existence on top of core logical standards and protocols, like the TCP/IP suite, the Domain Name System and routing protocols, and core physical infrastructure like subsea cables and their landing stations, DNS servers, and Internet exchange points (IXPs). It is vital that the stability and integrity of these core protocols and infrastructure are safeguarded. This is no longer a hypothetical concern, as the war in Ukraine has powerfully demonstrated. While threats to core protocols have long existed, they have acquired a heightened degree of sophistication and severity in recent years.









