Rise of iWar: Identity, Information, and the Individualization of Modern Warfare

Rating: 
Amazon Price: $14.99 $14.99 (as of August 21, 2017 02:27 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

During a decade of global counterterrorism operations and two extended counterinsurgency campaigns, the United States was confronted with a new kind of adversary. Without uniforms, flags, and formations, the task of identifying and targeting these combatants represented an unprecedented operational challenge. The existing, Cold War-era doctrinal methods were largely unsuited to the cyber-warfare and terrorism that have evolved today.

Rise of iWar examines the doctrinal, technical, and bureaucratic innovations that evolved in response to these new operational challenges. It discusses the transition from a conventionally focused, Cold War-era military approach to one optimized for the internet age, focused on combating insurgency networks and conducting identity-based targeting. It also analyzes the policy decisions and strategic choices that caused these changes. This study concludes with an in-depth examination of emerging technologies that are likely to shape how this mode of warfare will be waged in the future, and provides recommendations for how the US military should continue to adapt to be combat its foes in the digital age.

Conquest in Cyberspace: National Security and Information Warfare

Conquest in Cyberspace: National Security and Information WarfareWith billions of computers in existence, cyberspace, ‘the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve.




Price: $30.99

Click here to buy from Amazon

Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow’s Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality)

Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality)The electricity infrastructure is one of society’s most critical infrastructures. The complexity of the electricity infrastructure system is increasing quickly, due to the increasing intensity of market-based power exchanges between electricity systems, the associated market restructuring and an increasing share of decentralized generation. As a consequence, the organizational complexity of power systems has exploded. At the same time, there is a shift in public and societal goals towards low-carbon and sustainable power generation. This will eventually require a drastic transformation of the industry. Increasingly, ICT is being depended upon for managing this infrastructure, for technical control and operation and for facilitating markets. A recent example is demand-side management, based on detailed metering of consumption and decentralized electricity generation.

The mutual dependence of the electricity and the ICT infrastructures raises challenging questions in the areas of dependability, security and resilience. Examples include vulnerability to (cyber) attacks, avoiding and repairing technical failures and protecting data confidentiality, while guaranteeing accessibility. Therefore, better models and methods for protection against exploits of system vulnerabilities, whether accidental or intentional such as in cyber attacks, are called for.

To address the above mentioned problems an advanced research workshop: “Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT” was organized in the Netherlands in May 2009. The objective of the workshop was to contribute to the security of current and future electricity infrastructures by analyzing the risks that are caused by the increasing reliance upon ICT and investigating options for managing these risks. The book presents the contributions to the workshop by distinguished invited keynote speakers and participants from the international scientific and industrial community.

Price: $129.00

Click here to buy from Amazon

Economics and National Strategy in the Information Age: Global Networks, Technology Policy, and Cooperative Competition

Economics and National Strategy in the Information Age: Global Networks, Technology Policy, and Cooperative CompetitionThe Information Age has dawned at the same time the global political system is in transition. High technology performance and economic productivity are converging across the major developed regions of North America, East Asia, and Europe. If U.S. economic, military, and political leadership is to continue, it must depend more on flexible adaptation to the new technical and organizational realities and less on technological dominance. The heart of this adaptation lies in the evolution of a national technology policy that emphasizes market forces and the exploitation of network linkages within and among commercial and military organizations.




Price: $97.95

Click here to buy from Amazon

The Third Industrial Revolution: How Lateral Power Is Transforming Energy, the Economy, and the World

The Third Industrial Revolution: How Lateral Power Is Transforming Energy, the Economy, and the WorldThe Industrial Revolution, powered by oil and other fossil fuels, is spiraling into a dangerous endgame. The price of gas and food are climbing, unemployment remains high, the housing market has tanked, consumer and government debt is soaring, and the recovery is slowing. Facing the prospect of a second collapse of the global economy, humanity is desperate for a sustainable economic game plan to take us into the future.

Here, Jeremy Rifkin explores how Internet technology and renewable energy are merging to create a powerful “Third Industrial Revolution.” He asks us to imagine hundreds of millions of people producing their own green energy in their homes, offices, and factories, and sharing it with each other in an “energy internet,” just like we now create and share information online.

Rifkin describes how the five-pillars of the Third Industrial Revolution will create thousands of businesses, millions of jobs, and usher in a fundamental reordering of human relationships, from hierarchical to lateral power, that will impact the way we conduct commerce, govern society, educate our children, and engage in civic life.

Rifkin’s vision is already gaining traction in the international community. The European Union Parliament has issued a formal declaration calling for its implementation, and other nations in Asia, Africa, and the Americas, are quickly preparing their own initiatives for transitioning into the new economic paradigm.

The Third Industrial Revolution is an insider’s account of the next great economic era, including a look into the personalities and players — heads of state, global CEOs, social entrepreneurs, and NGOs — who are pioneering its implementation around the world.

Price: $27.00

Click here to buy from Amazon