0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Deter, Disrupt, or Deceive - Assessing Cyber Conflict as an Intelligence Contest (Paperback): Robert Chesney, Max Smeets Deter, Disrupt, or Deceive - Assessing Cyber Conflict as an Intelligence Contest (Paperback)
Robert Chesney, Max Smeets; Foreword by Amy Zegart; Contributions by Robert Chesney, Max Smeets, …
R827 Discovery Miles 8 270 Ships in 10 - 15 working days

A fresh perspective on statecraft in the cyber domain The idea of “cyber war” has played a dominant role in both academic and popular discourse concerning the nature of statecraft in the cyber domain. However, this lens of war and its expectations for death and destruction may distort rather than help clarify the nature of cyber competition and conflict. Are cyber activities actually more like an intelligence contest, where both states and nonstate actors grapple for information advantage below the threshold of war? In Deter, Disrupt, or Deceive, Robert Chesney and Max Smeets argue that reframing cyber competition as an intelligence contest will improve our ability to analyze and strategize about cyber events and policy. The contributors to this volume debate the logics and implications of this reframing. They examine this intelligence concept across several areas of cyber security policy and in different national contexts. Taken as a whole, the chapters give rise to a unique dialogue, illustrating areas of agreement and disagreement among leading experts and placing all of it in conversation with the larger fields of international relations and intelligence studies. Deter, Disrupt, or Deceive is a must read because it offers a new way for scholars, practitioners, and students to understand statecraft in the cyber domain.

Deter, Disrupt, or Deceive - Assessing Cyber Conflict as an Intelligence Contest (Hardcover): Robert Chesney, Max Smeets Deter, Disrupt, or Deceive - Assessing Cyber Conflict as an Intelligence Contest (Hardcover)
Robert Chesney, Max Smeets; Foreword by Amy Zegart; Contributions by Robert Chesney, Max Smeets, …
R2,269 Discovery Miles 22 690 Ships in 10 - 15 working days

A fresh perspective on statecraft in the cyber domain The idea of “cyber war” has played a dominant role in both academic and popular discourse concerning the nature of statecraft in the cyber domain. However, this lens of war and its expectations for death and destruction may distort rather than help clarify the nature of cyber competition and conflict. Are cyber activities actually more like an intelligence contest, where both states and nonstate actors grapple for information advantage below the threshold of war? In Deter, Disrupt, or Deceive, Robert Chesney and Max Smeets argue that reframing cyber competition as an intelligence contest will improve our ability to analyze and strategize about cyber events and policy. The contributors to this volume debate the logics and implications of this reframing. They examine this intelligence concept across several areas of cyber security policy and in different national contexts. Taken as a whole, the chapters give rise to a unique dialogue, illustrating areas of agreement and disagreement among leading experts and placing all of it in conversation with the larger fields of international relations and intelligence studies. Deter, Disrupt, or Deceive is a must read because it offers a new way for scholars, practitioners, and students to understand statecraft in the cyber domain.

Political Risk - Facing the Threat of Global Insecurity in the Twenty-First Century (Paperback): Condoleezza Rice, Amy Zegart Political Risk - Facing the Threat of Global Insecurity in the Twenty-First Century (Paperback)
Condoleezza Rice, Amy Zegart 1
R371 R336 Discovery Miles 3 360 Save R35 (9%) Ships in 9 - 17 working days

'Smart. Informative. Overdue' Eric Schmidt, former CEO of Google Political risk - the probability that a political action could significantly affect an organisation - is changing fast, and it's more widespread than ever before. In the past, the chief concern used to be whether a foreign dictator would nationalise the country's oil industry. Today, political risk stems from a widening array of agents, from Twitter users and terrorists to hackers and insurgents. What's more, the very institutions and laws that are supposed to reduce uncertainty and risk often increase it instead. This means that in today's globalised world there are no 'safe' bets. Political risk affects companies and organisations of all sizes, operating everywhere from London to Lahore, even if they don't know it. Political Risk investigates and analyses this shifting landscape, suggests what businesses can do to navigate it, and explains how all of us can better understand these rapidly changing geopolitical dynamics.

Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed): Amy Zegart Flawed by Design - The Evolution of the CIA, JCS, and NSC (Paperback, 1 New Ed)
Amy Zegart
R691 Discovery Miles 6 910 Ships in 18 - 22 working days

In this provocative and thoughtful book, Amy Zegart challenges the conventional belief that national security agencies work reasonably well to serve the national interest as they were designed to do. Using a new institutionalist approach, Zegart asks what forces shaped the initial design of the Central Intelligence Agency, the Joint Chiefs of Staff, and the National Security Council in ways that meant they were handicapped from birth.
Ironically, she finds that much of the blame can be ascribed to cherished features of American democracy--frequent elections, the separation of powers, majority rule, political compromise--all of which constrain presidential power and give Congress little incentive to create an effective foreign policy system. At the same time, bureaucrats in rival departments had the expertise, the staying power, and the incentives to sabotage the creation of effective competitors, and this is exactly what they did.
Historical evidence suggests that most political players did not consider broad national concerns when they forged the CIA, JCS, and NSC in the late 1940s. Although President Truman aimed to establish a functional foreign policy system, he was stymied by self-interested bureaucrats, legislators, and military leaders. The NSC was established by accident, as a byproduct of political compromise; Navy opposition crippled the JCS from the outset; and the CIA emerged without the statutory authority to fulfill its assigned role thanks to the Navy, War, State, and Justice departments, which fought to protect their own intelligence apparatus.
Not surprisingly, the new security agencies performed poorly as they struggled to overcome their crippled evolution. Only the NSC overcame its initial handicaps as several presidents exploited loopholes in the National Security Act of 1947 to reinvent the NSC staff. The JCS, by contrast, remained mired in its ineffective design for nearly forty years--i.e., throughout the Cold War--and the CIA's pivotal analysis branch has never recovered from its origins. In sum, the author paints an astonishing picture: the agencies Americans count on most to protect them from enemies abroad are, by design, largely incapable of doing so.

Bytes, Bombs, and Spies - The Strategic Dimensions of Offensive Cyber Operations (Paperback): Herbert Lin, Amy Zegart Bytes, Bombs, and Spies - The Strategic Dimensions of Offensive Cyber Operations (Paperback)
Herbert Lin, Amy Zegart
R1,534 Discovery Miles 15 340 Ships in 18 - 22 working days

"We are dropping cyber bombs. We have never done that before."-U.S. Defense Department official. A new era of war fighting is emerging for the U.S. military. Hi-tech weapons have given way to hi tech in a number of instances recently: A computer virus is unleashed that destroys centrifuges in Iran, slowing that country's attempt to build a nuclear weapon. ISIS, which has made the internet the backbone of its terror operations, finds its network-based command and control systems are overwhelmed in a cyber attack. A number of North Korean ballistic missiles fail on launch, reportedly because their systems were compromised by a cyber campaign. Offensive cyber operations like these have become important components of U.S. defense strategy and their role will grow larger. But just what offensive cyber weapons are and how they could be used remains clouded by secrecy. This new volume by Amy Zegart and Herb Lin is a groundbreaking discussion and exploration of cyber weapons with a focus on their strategic dimensions. It brings together many of the leading specialists in the field to provide new and incisive analysis of what former CIA director Michael Hayden has called "digital combat power" and how the United States should incorporate that power into its national security strategy.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Recasting Workers' Power - Work And…
Edward Webster, Lynford Dor Paperback R350 R323 Discovery Miles 3 230
Immaculate Heart of Mary Sisters of…
Patricia Montemurri Paperback R561 R515 Discovery Miles 5 150
Olga Kirsch - A Life In Poetry
Egonne Roth Paperback R275 R254 Discovery Miles 2 540
Inside Smartgeometry - Expanding the…
T. Peters Hardcover R1,089 Discovery Miles 10 890
Devon Coast to Coast Cycle Route - With…
Eric Van der Horst Spiral bound R329 Discovery Miles 3 290
Cycle Touring in Wales - A two-week…
Richard Barrett Paperback R370 R336 Discovery Miles 3 360
North York Moors Mountain Biking…
Tony Harker Paperback R414 Discovery Miles 4 140
Riding It Out
Pam Goodall Paperback R364 Discovery Miles 3 640
Semiconductor Modeling: - For Simulating…
Roy Leventhal Hardcover R4,438 Discovery Miles 44 380
Reporting the Siege of Sarajevo
Kenneth Morrison, Paul Lowe Hardcover R3,346 Discovery Miles 33 460

 

Partners