Amazon Price: $83.00 $76.66 You save: $6.34 (8%) (as of January 27, 2021 16:11 –
A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. And yet, there is perhaps no issue that has grown so important, so quickly, and that touches so many, that remains so poorly understood.
In Cybersecurity and CyberWar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do? Along the way, they take readers on a tour of the important (and entertaining) issues and characters of cybersecurity, from the "Anonymous" hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and U.S. militaries. Cybersecurity and CyberWar: What Everyone Needs to Know® is the definitive account on the subject for us all, which comes not a moment too soon.
Continue reading “Cybersecurity and Cyberwar: What Everyone Needs to Know®”
Amazon Price: $200.00 (as of January 27, 2021 05:39 –
Targeting is the primary method for securing strategic objectives in an armed conflict. Failure to comply with the law of targeting jeopardizes the achievement of those aims. It is therefore essential that all those involved in or studying issues surrounding targeting have an accurate and complete understanding of this area of law. This book offers the definitive and comprehensive statement of all aspects of the law of targeting. It is a 'one-stop shop' that answers all relevant questions in depth. It has been written in an open, accessible yet comprehensive style, and addresses both matters of established law and issues of topical controversy.
The text explains the meanings of such terms as 'civilian', 'combatant', and 'military objective'. Chapters are devoted to the core targeting principles of distinction, discrimination, and proportionality, as well as to the relationship between targeting and the protection of the environment and of objects and persons entitled to special protection. New technologies are also covered, with chapters looking at attacks using unmanned platforms and a discussion of the issues arising from cyber warfare. The book also examines recent controversies and perceived ambiguities in the rules governing targeting, including the use of human shields, the level of care required in a bombing campaign, and the difficulties involved in determining whether someone is directly participating in hostilities. This book will be invaluable to all working in this contentious area of law.
Amazon Price: $41.66 (as of January 27, 2021 04:20 –
China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization" reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians.
Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber — attacks — predominantly from the United States.
Continue reading “China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain”
Amazon Price: $71.00 (as of January 26, 2021 21:14 –
A Guide to National Security offers an analysis of the threats and policy responses facing the UK, presented within the framework of the Government's National Security Strategy and the Strategic Defence and Security Review. It explores the processes and developments which have shaped the transformation of national security over the last three decades, and critically examines the processes of politicisation and securitisation that have delivered the new strategic vision.
Presented in three parts, the book has taken one of the key recommendations from the National Security Strategy – collaboration between police and national security agencies – and used this as both the viewpoint from which to assess the current state of play regarding the UK's national security, as well as the approach to identifying future threats and creating policies and tactics to deal with them. Part One: Threats sets the scene for the current status of national security in the UK and relates this to the rest of the world, before moving on to the myriad of possible threats facing governments and intelligence services, from organised crime and terrorism to cyber-threats and failed states. Part Two: Responses looks at the interaction between governments and other agencies in response to a threat, how that framework functions and is organized, as well as the action or response taken. Finally, Part Three: Strategies offers a range of considerations for the future, including making a case for military restructuring, discussing domestic policies regarding radicalisation and other internal security issues, and the building of partnerships with the EU and the rest of the world, as well as within current international organizations, such as the UN and NATO. Throughout, the book presents opinions from leading figures across the agencies, including the National Security Council and members of ACPO, as well as case studies and suggestions for further investigation.
Continue reading “A Guide to National Security: Threats, Responses and Strategies”
Amazon Price: $17.04 (as of January 27, 2021 12:54 –
Despite the swift spread of social network concepts and their applications and the rising use of network analysis in social science, there is no book that provides a thorough general introduction for the serious reader. Understanding Social Networks fills that gap by explaining the big ideas that underlie the social network phenomenon. Written for those interested in this fast moving area but who are not mathematically inclined, it covers fundamental concepts, then discusses networks and their core themes in increasing order of complexity. Kadushin demystifies the concepts, theories, and findings developed by network experts. He selects material that serves as basic building blocks and examples of best practices that will allow the reader to understand and evaluate new developments as they emerge. Understanding Social Networks will be useful to social scientists who encounter social network research in their reading, students new to the network field, as well as managers, marketers, and others who constantly encounter social networks in their work.