Amazon Price: $55.00 $54.98 You save: $0.02 (%). (as of September 20, 2017 03:36 –
In a world in which cyberspace is becoming every country’s center of gravity, the issue of cyberwar can no longer be ignored. Cyberspace in Peace and War is the first comprehensive, instructional guide to the challenge of cyberwar: how to conduct it but, more importantly, how to avoid it using a mix of cybersecurity policies coupled with deterrence, escalation, signaling, and norms strategies. The result of over twenty years of analysis and assessment by author Martin C. Libicki, this text should be of particular interest to those concerned with the current and future challenges that face the digital frontier. Though written from a U.S. perspective, the principles discussed are globally relevant.
Cyberspace in Peace and War presents a comprehensive understanding of cybersecurity, cyberwar, and cyber terrorism. From basic concepts to advanced principles, Libicki examines the sources and consequences of system compromises, addresses how cybersecurity policies can strengthen countries defenses―leaving them less susceptible to cyberattack, and explores cybersecurity in the context of military operations, highlighting unique aspects of the digital battleground and strategic uses of cyberwar. He provides the technical and geopolitical foundations of cyberwar necessary to understand the policies, operations, and strategies required for safeguarding an increasingly online infrastructure.
Continue reading “Cyberspace in Peace and War (Transforming War)”
Amazon Price: $31.95 $24.84 You save: $7.11 (22%). (as of September 20, 2017 02:27 –
From Publishers Weekly: Written by a Defense Intelligence Agency analyst, this is a straightforward examination of the structure, operations and methodology of the intelligence services of the People's Republic of China. Eftimiades describes how the Ministry of State Security–China's preeminent civilian intelligence-gathering entity–draws on the services of diplomats, commercial representatives, Chinese communities in overseas cities and students. (The People's Republic sends approximately 40,000 students abroad annually.) His analysis of the case of Larry Wu-Tai Chin, a longtime CIA employee who was convicted of espionage in 1986, reveals much about Chinese operations in the United States. Although Eftimiades cautions that the Ministry of State Security will continue to penetrate and exploit the political, academic, industrial and technological institutions of Western nations, he adds reassuringly that China's intelligence apparatus is hobbled by its own red tape and hindered by the stultifying bureaucracy of the Chinese Communist Party. Of interest mainly to specialists.
Amazon Price: $39.95 $38.67 You save: $1.28 (3%). (as of September 20, 2017 03:26 –
How does one engage in the study of strategy? Strategy: Context and Adaptation from Archidamus to Airpower argues that strategy is not just concerned with amassing knowledge; it is also about recognizing our imperfect understanding of the environment and respecting the complex nature of adaptation to the unforeseen or unexpected. In essence, the strongest strategists are those who commit to an education that cultivates a more holistic and adaptive way of thinking. With that thought in mind, the contributors to Strategy, each a current or former professor at the School of Advanced Air and Space Studies, widely considered the Department of Defense’s premier school of strategy, offer ways of thinking strategically about a variety of subject matters, from classical history to cyber power.
Practitioners in the profession of arms, perhaps more than any other profession, must employ critical thinking where the application of power on land, at sea, in the air, and in space and cyberspace are concerned. Strategy examines various sub-disciplines regarding the use of power, and illuminates different approaches to thinking which have implications beyond the implementation of force.
Amazon Price: N/A (as of September 20, 2017 20:29 –
This book is written to be a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class for students of public policy (including political science, law, business, etc.). Although written from a U.S. perspective, most of its contents are globally relevant.
It is written essentially in four sections. The first (chapters 1 – 5) describes how compromises of computers and networks permit unauthorized parties to extract information from such systems (cyber-espionage), and/or to force these systems to misbehave in ways that disrupt their operations or corrupt their workings. The section examines notable hacks of systems, fundamental challenges to cybersecurity (e.g., the lack of forced entry, the measure-countermeasure relationship) including the role of malware, and various broad approaches to cybersecurity.
Continue reading “Cyberspace in Peace and War (Transforming War)”
Amazon Price: $32.95 $22.75 You save: $10.20 (31%). (as of September 20, 2017 07:37 –
This book explains what network-centric warfare is, and how it works, using concrete historical naval examples rather than the usual abstractions. It argues that navies invented this style of warfare over the last century, led by the Royal Navy, and that the wars of that century, culminating in the Cold War, show how networked warfare worked – and did not work.These wars also illustrate what net-on-net warfare means; most exponents of the new style of war assume that the United States will enjoy a monopoly on it. This account is important to all the services; it is naval because navies were the first to use network-centric approaches (the book does take national air defense into account, because air defense systems deeply influenced naval development). This approach is probably the only way a reader can get a realistic feeling for what the new style of war offers, and also for what is needed to make it work. Thus the book concentrates on the tactical picture which the network is erected to help form and to disseminate, rather than, as is usual, the communications network itself.This approach makes it possible to evaluate different possible contributions to a network-centric system, because it focuses on what the warriors using the picture really want and need.Without such a focus, the needs of networked warfare reduce simply to the desire for more and more information, delivered at greater and greater speeds. Although it concentrates on naval examples, this book is of vital importance to all the services. It is the first book about network-centric warfare to deal in concrete examples, and the first to use actual history to illuminate current operational concepts.It also offers considerable new light on the major naval battles of the World Wars, hence ought to be of intense interest to historians. For example, it offers a new way of understanding the naval revolution wrought in the pre-1914 Royal Navy by Admiral Sir John Fisher.