CyberWar

Si Vis Pacem, Para Bellum

By

Smart Grid Security: An End-to-End View of Security in the New Electrical Grid

Rating: 
Amazon Price: N/A (as of May 23, 2017 12:34 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers. Smart Grid Security: An End-to-End View of Security in the New Electrical Grid explores the important techniques, challenges, and forces that will shape how we achieve a secure twenty-first century electric grid.

Includes a Foreword by Michael Assante, President and CEO, National Board of Information Security Examiners
Read More

By

Cybersecurity Information Sharing Act of 2015

Amazon Price: $12.95 $12.95 (as of May 22, 2017 20:31 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Over the last several years, the Committee has listened with increasing alarm to the testimony of senior intelligence officials and private sector experts about the growing cybersecurity threats to our nation. The Committee has already seen the impact these threats are having on the nation's security and its economy as losses to consumers, businesses, and the government from cyber attacks, penetrations, and disruptions already total billions of dollars. Beyond direct monetary losses, the continuing efforts of foreign actors to steal intellectual property will have far reaching impacts on the innovation upon which a robust economy and strong military relies. The Committee has seen widespread theft through cyberspace increasingly evolve into disruptive and destructive attacks. Our nation is growing more vulnerable to cyber threats. Every aspect of society is growing more dependent on computers which are all linked to networks, opening this country up to many known vulnerabilities and many yet to be discovered.

By

China’s Search for Security

Rating: 
Amazon Price: $32.95 $26.04 You save: $6.91 (21%). (as of May 22, 2017 23:49 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Despite its impressive size and population, economic vitality, and drive to upgrade its military capabilities, China remains a vulnerable nation surrounded by powerful rivals and potential foes. The key to understanding China's foreign policy is to grasp these geostrategic challenges, which persist even as the country comes to dominate its neighbors. Andrew J. Nathan and Andrew Scobell analyze China's security concerns on four fronts: at home, with its immediate neighbors, in surrounding regional systems, and in the world beyond Asia. By illuminating the issues driving Chinese policy, they offer new perspective on China's rise and a strategy for balancing Chinese and American interests in Asia.
Though rooted in the present, Nathan and Scobell's study makes ample use of the past, reaching back into history to contextualize the people and institutions shaping Chinese strategy. They examine Chinese views of the United States; explain why China is so concerned about Japan; and uncover China's interests in such trouble spots as North Korea, Iran, and the Sudan. The authors probe recent troubles in Tibet and Xinjiang and establish links to forces beyond China's borders. They consider the tactics deployed by both sides of mainland China and Taiwan's complicated relationship, as Taiwan seeks to maintain autonomy while China tries to move toward unification, and they evaluate the strengths and weaknesses of China's three main power resources — economic power, military power, and soft power. The book concludes with recommendations for the United States as it seeks to manage China's rise. Chinese policymakers understand that the nation's prosperity, stability, and security depend on cooperation with the U.S, and if handled wisely, relations between the two countries could produce mutually beneficial outcomes in Asia and throughout the world.

By

The Use of Force: Military Power and International Politics

Rating: 
Amazon Price: $120.00 $95.22 You save: $24.78 (21%). (as of May 23, 2017 13:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Use of Force, long considered a classic in its own right, brings together enduring, influential works on the role of military power in foreign policy and international politics. Now in its eighth edition, the reader has been significantly revised; with twenty innovative and up-to-date selections, this edition is 60 percent new. Meticulously chosen and edited by leading scholars Robert J. Art and Kelly M. Greenhill, the selections are grouped under three headings: theories, case studies, and contemporary issues. The first section includes essays that cover the security dilemma, terrorism, the sources of military doctrine, the nuclear revolution, and the fungibility of force. A new subsection of Part I also deals with ethical issues in the use of force. The second section includes case studies in the use of force that span the period from World War I through the war in Afghanistan. The final section considers issues concerning the projection of US military power; the rising power of China; the spread of biological and nuclear weapons and cyberwarfare; intervention in internal conflicts and insurgencies; and possible future developments in terrorism, nuclear abolition, and robotic warfare. Continuing the tradition of previous editions, this fully updated reader collects the best analysis by influential thinkers on the use of force in international affairs.

Contributions by: Bruce J. Allyn, Kenneth Anderson, Robert J. Art, Mark S. Bell, Richard K. Betts, Laurie R. Blank, James G. Blight, Stephen G. Brooks, Seyom Brown, Daniel Byman, Audrey Kurth Cronin, Patrick M. Cronin, Alexander B. Downes, Karl W. Eikenberry, John Lewis Gaddis, Erik Gartke, Alexander L. George, Avery Goldstein, Kelly M. Greenhill, G. John Ikenberry, Robert Jervis, Gregory Koblentz, Peter R. Mansoor, John J. Mearsheimer, Nicholas L. Miller, Louis C. Morton, Barry R. Posen, Louise Richardson, George B. Samson, Thomas C. Schelling, Jack L. Snyder, Paul Staniland, Barbara F. Walter, Kenneth N. Waltz, Matthew Waxman, David A. Welch, Jon Western, and William C. Wohlforth.

By

Privacy in the Modern Age: The Search for Solutions

Rating: 
Amazon Price: $25.95 $14.26 You save: $11.69 (45%). (as of May 23, 2017 13:04 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The threats to privacy are well known: the National Security Agency tracks our phone calls; Google records where we go online and how we set our thermostats; Facebook changes our privacy settings when it wishes; Target gets hacked and loses control of our credit card information; our medical records are available for sale to strangers; our children are fingerprinted and their every test score saved for posterity; and small robots patrol our schoolyards and drones may soon fill our skies.

The contributors to this anthology don’t simply describe these problems or warn about the loss of privacythey propose solutions. They look closely at business practices, public policy, and technology design, and ask, Should this continue? Is there a better approach?” They take seriously the dictum of Thomas Edison: What one creates with his hand, he should control with his head.” It’s a new approach to the privacy debate, one that assumes privacy is worth protecting, that there are solutions to be found, and that the future is not yet known. This volume will be an essential reference for policy makers and researchers, journalists and scholars, and others looking for answers to one of the biggest challenges of our modern day. The premise is clear: there’s a problem—let’s find a solution.

/* */