|
Showing 1 - 25 of
75 matches in All Departments
Cyber-warfare is often discussed, but rarely truly seen. When does
an intrusion turn into an attack, and what does that entail? How do
nations fold offensive cyber operations into their strategies?
Operations against networks mostly occur to collect intelligence,
in peacetime. Understanding the lifecycle and complexity of
targeting adversary networks is key to doing so effectively in
conflict. Rather than discussing the spectre of cyber war, Daniel
Moore seeks to observe the spectrum of cyber operations. By piecing
together operational case studies, military strategy and technical
analysis, he shows that modern cyber operations are neither
altogether unique, nor entirely novel. Offensive cyber operations
are the latest incarnation of intangible warfare--conflict waged
through non-physical means, such as the information space or the
electromagnetic spectrum. Not all offensive operations are created
equal. Some are slow-paced, clandestine infiltrations requiring
discipline and patience for a big payoff; others are short-lived
attacks meant to create temporary tactical disruptions. This book
first seeks to understand the possibilities, before turning to look
at some of the most prolific actors: the United States, Russia,
China and Iran. Each has their own unique take, advantages and
challenges when attacking networks for effect.
This anthology focuses on the ethical issues surrounding
information control in the broadest sense. Anglo-American
institutions of intellectual property protect and restrict access
to vast amounts of information. Ideas and expressions captured in
music, movies, paintings, processes of manufacture, human genetic
information, and the like are protected domestically and globally.
The ethical issues and tensions surrounding free speech and
information control intersect in at least two important respects.
First, the commons of thought and expression is threatened by
institutions of copyright, patent, and trade secret. While
institutions of intellectual property may be necessary for
innovation and social progress they may also be detrimental when
used by the privileged and economically advantaged to control
information access, consumption, and expression. Second, free
speech concerns have been allowed to trump privacy interests in all
but the most egregious of cases. At the same time, our ability to
control access to information about ourselves--what some call
"informational privacy"--is rapidly diminishing. Data mining and
digital profiling are opening up what most would consider private
domains for public consumption and manipulation. Post-9/11, issues
of national security have run headlong into individual rights to
privacy and free speech concerns. While constitutional guarantees
against unwarranted searches and seizures have been relaxed, access
to vast amounts of information held by government agencies,
libraries, and other information storehouses has been restricted in
the name of national security.
Insane Acquaintances explores a range of exhibitions, organisations
and institutions that mediated and promoted modernism in Britain.
In a series of case studies on subjects ranging from the first
Postimpressionist exhibition in London in 1910, the teaching of
modernist art in schools, the decoration and design of the
modernist home, the International Surrealist exhibition in London
in 1936 and the Festival of Britain in 1951, Insane Acquaintances
charts some of the ways in which modernism not only sought to
improve the quality of art but also the quality of art's reception
in Britain. It also provides an institutional history of some of
the groups and organisations that fostered modernist art in Britain
during that period.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|