CyberWar

Si Vis Pacem, Para Bellum

By

Network-Centric Warfare: How Navies Learned to Fight Smarter Through Three World Wars

Network-Centric Warfare: How Navies Learned to Fight Smarter Through Three World WarsOver the past decade, the United States has moved toward a new style of warfare, called network centric, that uses an almost real-time, shared picture of a military situation as the basis for operations. To explain what network-centric warfare is and how it works, defense analyst Norman Friedman uses specific historical examples of actual combat rather than the abstractions common to other books on the subject. He argues that navies invented this style of warfare and that twentieth-century wars, culminating in the Cold War, show how networked warfare worked and did not work and illustrate what net-on-net warfare means. The book builds on Friedman s personal experience in an early application of network-centric warfare that developed the method of targeting the Tomahawk anti-ship missile.To give readers a realistic feeling for what the new style of warfare offers and what is needed to make it work, the book concentrates on the tactical picture, not the communications network itself. Friedman s focus on what the warriors really want and need makes it possible to evaluate the various contributions to a network-centric system. Without such a focus, Friedman notes, the needs of networked warfare reduce simply to the desire for more and more information, delivered at greater and greater speeds. The information he provides is valuable to all the services, and students of history will appreciate the light it sheds on new ways of understanding old conflicts.

Price: $32.95

Click here to buy from Amazon

By

Cyber Warriors at War

Cyber Warriors at WarDr. Berg P. Hyacinthe (PhD, Florida State University; LLD Candidate, Assas School of Law, CERSA-CNRS, La Sorbonne) is internationally recognized as an eminent and multidisciplinary scientific investigator. A U.S. patent holder featured in Harvard’s Smithsonian/NASA Astrophysics Data System, Dr. Hyacinthe recently served as Assistant Professor and Scientific Advisor to Taibah University’s Strategic Science & Advanced Technology Unit. Dr. Hyacinthe held several positions at County and State levels of the U.S Government in the Information Technology arena. He has been featured in conferences held at the U.S. Naval Postgraduate School, Monterey (author); Defence Academy of the United Kingdom, Shrivenham (invited session Chair); and National Defence College, Helsinki (session Chair). In CYBER WARRIORS AT WAR, he draws on the triangular relationship between technology, law, and Information Age warfare to propose solutions against potential charges of having committed Information Operations (IO) war crimes and/or IO crimes against humanity. According to Dr. Hyacinthe, the success of pre-emptive strikes and decisive military operations depends profoundly upon both reliable human intelligence and the versatile skills of 21st century “cyber warriors” whose IO activities are conducted through modern warfare’s pentagonal synchrony – land, sea, air, cyberspace, and outer space. Unfortunately, these operations are commonly effectuated under a legal reasoning that is ambiguous in important ways: a threat to the national security of the United States of America and to the entire international community. Hence, as this Essay argues, the evolution of modern computer systems as weapons of war compels wary jurists to turn to the laws that should govern development and use of lethal information technologies. Further, this Essay examines how certain military operations within Information Warfare (IW) require new legal framework, and recounts specific events involving various types of IW conduct and cyber attack: an interesting exposé to jurists, military personnel, policymakers, and the growing and diverse body of information professionals around the world.

Price: $29.99

Click here to buy from Amazon

By

The Future of Power

Rating: 
Amazon Price: $17.99 $12.89 You save: $5.10 (28%). (as of March 28, 2017 08:08 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Power evolves. At the beginning of the twenty-first century, unsurpassed in military strength and ownership of world resources, the United States was indisputably the most powerful nation in the world. But the global information age is rendering these traditional markers of power obsolete. To remain at the pinnacle of world power, the United States must adopt a strategy that considers the impact of the internet on global power resources. The Future of Power examines what it means to be powerful in the twenty-first century and illuminates the road ahead.

By

Top Secret America: The Rise of the New American Security State

Rating: 
Amazon Price: $16.99 $8.05 You save: $8.94 (53%). (as of March 28, 2017 21:27 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

After 9/11, the United States government embarked on an unprecedented effort to protect America. The result has been calamitous: after ten years of unparalleled spending and growth, the result is that a system put in place to keep America safe may in fact be putting us in even greater danger-but we don't know because it's all Top Secret.

In TOP SECRET AMERICA, award-winning journalists Dana Priest and William M. Arkin lift the curtain on this clandestine universe. From the companies and agencies keeping track of American citizens and the military commanders building America's first "top secret city" to a hidden army within the U.S. military more secret than the CIA, this new national security octopus has become a self-sustaining "Fourth Branch" of government. A tour de force of investigative journalism, TOP SECRET AMERICA presents a fascinating and disturbing account of government run amok and a war on terrorism gone wrong in a post-9/11.

By

Critical Infrastructure Protection II

Critical Infrastructure Protection II (IFIP International Federation for Information Processing) (IFIP Advances in Information and Communication Technology) (v. 2)The information infrastructure—comprising computers, embedded devices, networks and software systems—is vital to day-to-day operations in every sector: information and telecommunications, banking and finance, energy, chemicals and hazardous materials, agriculture, food, water, public health, emergency services, transportation, postal and shipping, government and defense. Global business and industry, governments, indeed society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed.

Critical Infrastructure Protection II describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include:

– Themes and Issues

– Infrastructure Security

– Control Systems Security

– Security Strategies

– Infrastructure Interdependencies

– Infrastructure Modeling and Simulation

This book is the second volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of twenty edited papers from the Second Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection held at George Mason University, Arlington, Virginia, USA in the spring of 2008.

Critical Infrastructure Protection II is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.

Mauricio Papa is an Associate Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a principal with the Center for Information Security at the University of Tulsa, Tulsa, Oklahoma, USA.

Price: $199.00

Click here to buy from Amazon

/* */