0
Your cart

Your cart is empty

Books > Computing & IT > Computer communications & networking > Network security

Buy Now

Cyber Strategy - The Evolving Character of Power and Coercion (Paperback) Loot Price: R849
Discovery Miles 8 490
Cyber Strategy - The Evolving Character of Power and Coercion (Paperback): Brandon Valeriano, Benjamin Jensen, Ryan C Maness

Cyber Strategy - The Evolving Character of Power and Coercion (Paperback)

Brandon Valeriano, Benjamin Jensen, Ryan C Maness

 (sign in to rate)
Loot Price R849 Discovery Miles 8 490 | Repayment Terms: R80 pm x 12*

Bookmark and Share

Expected to ship within 10 - 15 working days

Some pundits claim cyber weaponry is the most important military innovation in decades, a transformative new technology that promises a paralyzing first-strike advantage difficult for opponents to deter. Yet, what is cyber strategy? How do actors use cyber capabilities to achieve a position of advantage against rival states? This book examines the emerging art of cyber strategy and its integration as part of a larger approach to coercion by states in the international system between 2000 and 2014. To this end, the book establishes a theoretical framework in the coercion literature for evaluating the efficacy of cyber operations. Cyber coercion represents the use of manipulation, denial, and punishment strategies in the digital frontier to achieve some strategic end. As a contemporary form of covert action and political warfare, cyber operations rarely produce concessions and tend to achieve only limited, signaling objectives. When cyber operations do produce concessions between rival states, they tend to be part of a larger integrated coercive strategy that combines network intrusions with other traditional forms of statecraft such as military threats, economic sanctions, and diplomacy. The books finds that cyber operations rarely produce concessions in isolation. They are additive instruments that complement traditional statecraft and coercive diplomacy. The book combines an analysis of cyber exchanges between rival states and broader event data on political, military, and economic interactions with case studies on the leading cyber powers: Russia, China, and the United States. The authors investigate cyber strategies in their integrated and isolated contexts, demonstrating that they are useful for maximizing informational asymmetries and disruptions, and thus are important, but limited coercive tools. This empirical foundation allows the authors to explore how leading actors employ cyber strategy and the implications for international relations in the 21st century. While most military plans involving cyber attributes remain highly classified, the authors piece together strategies based on observations of attacks over time and through the policy discussion in unclassified space. The result will be the first broad evaluation of the efficacy of various strategic options in a digital world.

General

Imprint: Oxford UniversityPress
Country of origin: United States
Release date: April 2020
Authors: Brandon Valeriano (Donald Bren Chair of Armed Politics) • Benjamin Jensen (Associate Professor) • Ryan C Maness (Assistant Professor)
Dimensions: 234 x 156 x 19mm (L x W x T)
Format: Paperback
Pages: 320
ISBN-13: 978-0-19-752378-0
Categories: Books > Computing & IT > Computer communications & networking > Network security
Books > Social sciences > Politics & government > International relations > General
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > General
Promotions
LSN: 0-19-752378-1
Barcode: 9780197523780

Is the information for this product incomplete, wrong or inappropriate? Let us know about it.

Does this product have an incorrect or missing image? Send us a new image.

Is this product missing categories? Add more categories.

Review This Product

No reviews yet - be the first to create one!

You might also like..

CISA - Certified Information Systems…
Cannon Paperback R1,704 R1,343 Discovery Miles 13 430
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,248 R1,109 Discovery Miles 11 090
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,405 Discovery Miles 24 050
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,432 R1,187 Discovery Miles 11 870
Security Careers - Skills, Compensation…
Stephen W. Walker, James E. Foushee Paperback R1,859 Discovery Miles 18 590
PCI Dss: A Pocket Guide
IT Governance Paperback R375 Discovery Miles 3 750
Two-Factor Authentication
Mark Stanislav Paperback R489 Discovery Miles 4 890
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R650 Discovery Miles 6 500
Hacking - Computer Hacking for…
Adam Dodson Hardcover R609 R515 Discovery Miles 5 150
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,847 Discovery Miles 68 470
Introduction to Computer Security…
Michael Goodrich, Roberto Tamassia Paperback R2,361 Discovery Miles 23 610
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R8,595 Discovery Miles 85 950

See more

Partners