Amazon Price: $29.95 $16.39 You save: $13.56 (45%). (as of June 25, 2018 00:35 –
A military expert reveals how science fiction is fast becoming reality on the battlefield, changing not just how wars are fought, but also the politics, economics, laws, and ethics that surround war itself
P. W. Singer?s previous two books foretold the rise of private military contractors and the advent of child soldiers? predictions that proved all too accurate. Now, he explores the greatest revolution in military affairs since the atom bomb?the advent of robotic warfare.
Continue reading “Wired for War: The Robotics Revolution and Conflict in the 21st Century”
Amazon Price: $80.00 $79.98 You save: $0.02 (%). (as of June 25, 2018 12:26 –
In a world of increasing dependence on information technology, the prevention of cyberattacks on a nation's important computer and communications systems and networks is a problem that looms large. Given the demonstrated limitations of passive cybersecurity defense measures, it is natural to consider the possibility that deterrence might play a useful role in preventing cyberattacks against the United States and its vital interests. At the request of the Office of the Director of National Intelligence, the National Research Council undertook a two-phase project aimed to foster a broad, multidisciplinary examination of strategies for deterring cyberattacks on the United States and of the possible utility of these strategies for the U.S. government.
The first phase produced a letter report providing basic information needed to understand the nature of the problem and to articulate important questions that can drive research regarding ways of more effectively preventing, discouraging, and inhibiting hostile activity against important U.S. information systems and networks.
Continue reading “Proceedings of a Workshop on Deterring Cyberattacks: Informing Strategies and Developing Options for U.S. Policy”
Amazon Price: $18.95 $18.77 You save: $0.18 (1%). (as of June 25, 2018 10:54 –
Distributed Networked Operations describes a refinement of what popularly has been called "network centric operations."Distributed networked operations envision combat conducted by large numbers of diverse, small units-rather than by small numbers of generally homogenous, large units. In theory and to a significant extent in practice in Afghanistan and Iraq, distributed networked operations involve a mixed bag of naval, ground and air units, none of which is individually as powerful as a fleet, air wing or armored division.Author Jeff Cares discusses distributed networked operations from the perspective of adaptive control theory and details implications for force structure, hardware employment, and networked competition. Jeff presents a formal model of Information Age combat and explores the civilian business applications of the theory.
Amazon Price: $129.00 $116.94 You save: $12.06 (9%). (as of June 24, 2018 22:55 –
Book Information The fourth book in the bestselling Artech House EW 100 series is dedicated to reviewing legacy threats and discussing new threats which have arisen since Y2K in communications, radar, and IR threats. Like its predecessors, EW 104 presents a series of highly informative and easy-to-comprehend tutorials, along with insightful introductory and connective material that helps you understand how each aspect fits together. This reference starts with a review of the generalities of legacy threats, from the technical point of view, with a focus on what makes the new threats more challenging. Readers are provided with details of threats in three major areas – Communications, Radars, and IR Threats. Market Engineers and managers responsible for designing or evaluating communications electronic warfare systems, government defense system procurement managers, and defense contractors.
Amazon Price: N/A (as of June 25, 2018 10:11 –
Former secretary of defense Leon Panetta once described cyber warfare as “the most serious threat in the twenty-first century,” capable of destroying our entire infrastructure and crippling the nation.
Already, major cyber attacks have affected countries around the world: Estonia in 2007, Georgia in 2008, Iran in 2010, and most recently the United States. As with other methods of war, cyber technology can be used not only against military forces and facilities but also against civilian targets. Information technology has enabled a new method of warfare that is proving extremely difficult to combat, let alone defeat.
Continue reading “The Evolution of Cyber War: International Norms for Emerging-Technology Weapons”