Network-Centric Naval Forces: A Transition Strategy for Enhancing Operational Capabilities

Network-Centric Naval Forces: A Transition Strategy for Enhancing Operational CapabilitiesOwing to the expansion of network-centric operating concepts across the Department of Defense (DOD) and the growing threat to information and cybersecurity from lone actors, groups of like-minded actors, nation-states, and malicious insiders, information assurance is an area of significant and growing importance and concern. Because of the forward positioning of both the Navy's afloat and the Marine Corps expeditionary forces, IA issues for naval forces are exacerbated, and are tightly linked to operational success. Broad-based IA success is viewed by the NRC's Committee on Information Assurance for Network-Centric Naval Forces as providing a central underpinning to the DOD's network-centric operational concept and the Department of the Navy's (DON's) FORCEnet operational vision. Accordingly, this report provides a view and analysis of information assurance in the context of naval ‘mission assurance'.

Price: $130.25

Click here to buy from Amazon

The Internet in Brazil: Origins, Strategy, Development, and Governance

Rating: 
Amazon Price: N/A (as of September 20, 2017 08:08 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

How was the Internet born in Brazil? Who were its pioneers? How did they interact with the Internet’s fathers in the United States and Europe? What strategies guided the development of Brazil’s Internet? How has it developed in terms of coverage, usage, speed, pricing, and quality of service? What needs to be done to better realize its potential for accelerating economic, social and political development? What is the Brazilian model of Internet governance and how is it evolving? These are the major questions addressed in this book.

The author has been an observer and participant in the development and use of the Internet in Africa, Asia, Russia and the United States, but above all in Brazil. He has interacted with many Internet pioneers around the world who have inspired his work.
This book, completed immediately after the Global Stakeholder Meeting on the Future of Internet Governance (NETmundial) in São Paulo, seeks to provide background that will be useful to participants in that important gathering and to Internet enthusiasts in Brazil and around the world.

Strategy: Context and Adaptation from Archidamus to Airpower (Transforming War)

Rating: 
Amazon Price: $39.95 $38.67 You save: $1.28 (3%). (as of September 20, 2017 03:26 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

How does one engage in the study of strategy? Strategy: Context and Adaptation from Archidamus to Airpower argues that strategy is not just concerned with amassing knowledge; it is also about recognizing our imperfect understanding of the environment and respecting the complex nature of adaptation to the unforeseen or unexpected. In essence, the strongest strategists are those who commit to an education that cultivates a more holistic and adaptive way of thinking. With that thought in mind, the contributors to Strategy, each a current or former professor at the School of Advanced Air and Space Studies, widely considered the Department of Defense’s premier school of strategy, offer ways of thinking strategically about a variety of subject matters, from classical history to cyber power.

Practitioners in the profession of arms, perhaps more than any other profession, must employ critical thinking where the application of power on land, at sea, in the air, and in space and cyberspace are concerned. Strategy examines various sub-disciplines regarding the use of power, and illuminates different approaches to thinking which have implications beyond the implementation of force.

Wiki at War: Conflict in a Socially Networked World

Wiki at War: Conflict in a Socially Networked WorldIn 2011, amid the popular uprising against Egyptian president Hosni Mubarak, the government sought in vain to shut down the Internet-based social networks of its people.

WikiLeaks editor-in-chief Julian Assange has been branded “public enemy number one” by some in the United States for posting material on the World Wide Web that concerns airstrikes in Iraq, US diplomatic communications, and other sensitive matters.
In Wiki at War, James Jay Carafano explains why these and other Internet-born initiatives matter and how they are likely to affect the future face of war, diplomacy, and domestic politics.
“The war for winning dominance over social networks and using that dominance to advantage is already underway,” Carafano writes in this extremely timely analysis of the techno-future of information and the impact of social networking via the Internet. Drawing on his extensive knowledge of history and defense strategy, Carafano creates a cogent analysis of what is truly new about the “new media,” and what is simply a recasting of human warfare in contemporary forms.
Wiki at War is written in a lively, accessible style that will make this technological development comprehensible and engaging for general readers without sacrificing the book’s usefulness to specialists. Outlining the conditions under which a difference in degree becomes a difference in kind, detailing how ancient wisdom can still apply to national security decisions, and examining the conditions under which new expertise is required to wage effective diplomacy or successful military strategy, Carafano casts in stark relief the issues that face political, military, and social leaders in trying to manage and control information, in both the international and domestic arenas. Wiki at War affords stimulating thought about and definitive discussion of this vital emerging topic.

Price: $24.95

Click here to buy from Amazon

 

China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain

Rating: 
Amazon Price: N/A (as of September 20, 2017 00:34 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization" reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians.
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber — attacks — predominantly from the United States.
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain is a comprehensive analysis of China's cyberspace threats and policies. The contributors — Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West — address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.