"This volume is encyclopedic, creative, and readable, challenging in its detail and reflections, and equally useful for political and military experts who are not steeped in cyber technology and technical specialists who need grounding in policy and strategy." -Richard K. Betts, PhD, Director, Saltzman Institute of War and Peace Studies, Columbia University, and author of Enemies of Intelligence and American Force "Martin Libicki has given us just we need in the complex area of cyber: a clear and comprehensive analysis of the entire range of issues from the technical to the operational and political. It is an indispensable one-stop shopping resource that can be read with great benefit by both novices and experts." -Robert Jervis, Adlai E. Stevenson Professor of International Politics, Columbia University "Delivers both a thorough introduction to the topic and a compelling set of recommendations on what to do about the national security challenge of our time." -Robert Knake, Whitney Shepardson senior fellow at the Council on Foreign Relations "A comprehensive and readable discussion of a complicated topic, and an important contribution to a vital issue." -Bruce Schneier, lecturer at Harvard University's Kennedy School of Government "This work is likely to become well known for having bridged the divides that exist among technologists, strategists, operators, and policymakers in their search for solutions to cyberspace's multifaceted challenges, and should be read by every student and practitioner of these disciplines." - Military Technology "[This book] introduces additional nuances into the debate about digital conflicts and, at the same time, resist the temptation to regard them as acts analogous to nuclear conflicts or wars using conventional weapons." - Russia in Global Politics "This book is a must-read for those in Australia's military high command and other government departments with a responsibility for national security. One thing is certain, the hackers, especially those that are government-sponsored, will already have it on their e-book shelves." - Australian Defence Force Journal "[T]his book is recommended for those who want a basic understanding of cyberspace to those who currently hold a position within the realm of national security and everyone in-between. This book is truly a modern classic on the topic of cyberspace." - Air & Space Power Journal
This book is written to be a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class for students of public policy (including political science, law, business, etc.). Although written from a U.S. perspective, most of its contents are globally relevant. It is written essentially in four sections. The first (chapters 1 - 5) describes how compromises of computers and networks permit unauthorized parties to extract information from such systems (cyber-espionage), and/or to force these systems to misbehave in ways that disrupt their operations or corrupt their workings. The section examines notable hacks of systems, fundamental challenges to cybersecurity (e.g., the lack of forced entry, the measure-countermeasure relationship) including the role of malware, and various broad approaches to cybersecurity. The second (chapters 6 - 9) describes what government policies can, and, as importantly, cannot be expected to do to improve a nation's cybersecurity thereby leaving leave countries less susceptible to cyberattack by others. Among its focus areas are approaches to countering nation-scale attacks, the cost to victims of broad-scale cyberespionage, and how to balance intelligence and cybersecurity needs. The third (chapters 10 - 15) looks at cyberwar in the context of military operations. Describing cyberspace as the 5th domain of warfare feeds the notion that lessons learned from other domains (e.g., land, sea) apply to cyberspace. In reality, cyberwar (a campaign of disrupting/corrupting computers/networks) is quite different: it rarely breaks things, can only be useful against a sophisticated adversary, competes against cyber-espionage, and has many first-strike characteristics. The fourth (chapters 16 - 35) examines strategic cyberwar within the context of state-on-state relations. It examines what strategic cyberwar (and threats thereof) can do against whom - and how countries can respond. It then considers the possibility and limitations of a deterrence strategy to modulate such threats, covering credibility, attribution, thresholds, and punishment (as well as whether denial can deter). It continues by examining sub rosa attacks (where neither the effects nor the attacker are obvious to the public); the role of proxy cyberwar; the scope for brandishing cyberattack capabilities (including in a nuclear context); the role of narrative and signals in a conflict in cyberspace; questions of strategic stability; and norms for conduct in cyberspace (particularly in the context of Sino-U.S. relations) and the role played by international law. The last chapter considers the future of cyberwar.
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
EUR 3,32 für den Versand innerhalb von/der USA
Versandziele, Kosten & DauerEUR 3,81 für den Versand innerhalb von/der USA
Versandziele, Kosten & DauerAnbieter: HPB-Red, Dallas, TX, USA
Hardcover. Zustand: Good. Connecting readers with great books since 1972! Used textbooks may not include companion materials such as access codes, etc. May have some wear or writing/highlighting. We ship orders daily and Customer Service is our top priority! Bestandsnummer des Verkäufers S_364624587
Anzahl: 1 verfügbar
Anbieter: SecondSale, Montgomery, IL, USA
Zustand: Good. Item in good condition. Textbooks may not include supplemental items i.e. CDs, access codes etc. Bestandsnummer des Verkäufers 00043085013
Anzahl: 1 verfügbar
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Good. Used book that is in clean, average condition without any missing pages. Bestandsnummer des Verkäufers 18415203-6
Anzahl: 1 verfügbar
Anbieter: Better World Books, Mishawaka, IN, USA
Zustand: Good. Former library book; may include library markings. Used book that is in clean, average condition without any missing pages. Bestandsnummer des Verkäufers 52201229-6
Anzahl: 2 verfügbar
Anbieter: Emerald Green Media, Simi Valley, CA, USA
Hardcover. Zustand: Fine. Clean Copy Established Seller, We Ship Daily! Bestandsnummer des Verkäufers mon0000039059
Anzahl: 6 verfügbar
Anbieter: Patrico Books, Apollo Beach, FL, USA
Hardcover. Zustand: Very Good. Ships Out Tomorrow! Bestandsnummer des Verkäufers 220406115
Anzahl: 1 verfügbar
Anbieter: Toscana Books, AUSTIN, TX, USA
Hardcover. Zustand: new. Excellent Condition.Excels in customer satisfaction, prompt replies, and quality checks. Bestandsnummer des Verkäufers Scanned1682470326
Anzahl: 1 verfügbar