|
Showing 1 - 5 of
5 matches in All Departments
A fresh perspective on statecraft in the cyber domain The idea of
“cyber war” has played a dominant role in both academic and
popular discourse concerning the nature of statecraft in the cyber
domain. However, this lens of war and its expectations for death
and destruction may distort rather than help clarify the nature of
cyber competition and conflict. Are cyber activities actually more
like an intelligence contest, where both states and nonstate actors
grapple for information advantage below the threshold of war? In
Deter, Disrupt, or Deceive, Robert Chesney and Max Smeets argue
that reframing cyber competition as an intelligence contest will
improve our ability to analyze and strategize about cyber events
and policy. The contributors to this volume debate the logics and
implications of this reframing. They examine this intelligence
concept across several areas of cyber security policy and in
different national contexts. Taken as a whole, the chapters give
rise to a unique dialogue, illustrating areas of agreement and
disagreement among leading experts and placing all of it in
conversation with the larger fields of international relations and
intelligence studies. Deter, Disrupt, or Deceive is a must read
because it offers a new way for scholars, practitioners, and
students to understand statecraft in the cyber domain.
A fresh perspective on statecraft in the cyber domain The idea of
“cyber war” has played a dominant role in both academic and
popular discourse concerning the nature of statecraft in the cyber
domain. However, this lens of war and its expectations for death
and destruction may distort rather than help clarify the nature of
cyber competition and conflict. Are cyber activities actually more
like an intelligence contest, where both states and nonstate actors
grapple for information advantage below the threshold of war? In
Deter, Disrupt, or Deceive, Robert Chesney and Max Smeets argue
that reframing cyber competition as an intelligence contest will
improve our ability to analyze and strategize about cyber events
and policy. The contributors to this volume debate the logics and
implications of this reframing. They examine this intelligence
concept across several areas of cyber security policy and in
different national contexts. Taken as a whole, the chapters give
rise to a unique dialogue, illustrating areas of agreement and
disagreement among leading experts and placing all of it in
conversation with the larger fields of international relations and
intelligence studies. Deter, Disrupt, or Deceive is a must read
because it offers a new way for scholars, practitioners, and
students to understand statecraft in the cyber domain.
A unique overview of the United States' current nuclear command,
control, and communications system and its modernization for the
digital age Concerns about the security of nuclear command,
control, and communications (NC3) systems are not new, but they are
becoming more urgent. While modernization is crucial to the future
success of NC3 systems, the transition from analog to digital
technologies has the potential to introduce vulnerabilities and
unintended consequences. Nuclear infrastructure and command could
be penetrated, corrupted, destroyed, or spoofed, leading to a loss
of positive control (the ability to fire weapons) or negative
control (the ability to prevent unauthorized or accidental use).
Nuclear Command, Control, and Communications explores the current
NC3 system and its vital role in ensuring effective deterrence,
contemporary challenges posed by cyber threats, new weapons
technologies, and the consensus across the nuclear enterprise of
the need to modernize the United States' Cold War-era system of
systems. This volume, edited by James J. Wirtz and Jeffrey A.
Larsen, offers the first overview of US NC3 since the 1980s. Part 1
provides an overview of the history, strategy, and technology
associated with NC3 and how it enables deterrence strategy as the
basis of national defense. Parts 2 and 3 identify how the US
military's NC3 works, the challenges of introducing digital
technologies and the potential security threats, and how the system
could fail if these considerations are not taken into account. Part
4 explains the progress NC3 has made thus far, and how we might
move forward. During this critical juncture, policymakers,
practitioners, and scholars will find this an invaluable resource
to understanding our current NC3 system, its relationship to
effective deterrence, what must be done to modernize NC3, and how
to ensure this transition is undertaken safely and successfully.
A unique overview of the United States' current nuclear command,
control, and communications system and its modernization for the
digital age Concerns about the security of nuclear command,
control, and communications (NC3) systems are not new, but they are
becoming more urgent. While modernization is crucial to the future
success of NC3 systems, the transition from analog to digital
technologies has the potential to introduce vulnerabilities and
unintended consequences. Nuclear infrastructure and command could
be penetrated, corrupted, destroyed, or spoofed, leading to a loss
of positive control (the ability to fire weapons) or negative
control (the ability to prevent unauthorized or accidental use).
Nuclear Command, Control, and Communications explores the current
NC3 system and its vital role in ensuring effective deterrence,
contemporary challenges posed by cyber threats, new weapons
technologies, and the consensus across the nuclear enterprise of
the need to modernize the United States' Cold War-era system of
systems. This volume, edited by James J. Wirtz and Jeffrey A.
Larsen, offers the first overview of US NC3 since the 1980s. Part 1
provides an overview of the history, strategy, and technology
associated with NC3 and how it enables deterrence strategy as the
basis of national defense. Parts 2 and 3 identify how the US
military's NC3 works, the challenges of introducing digital
technologies and the potential security threats, and how the system
could fail if these considerations are not taken into account. Part
4 explains the progress NC3 has made thus far, and how we might
move forward. During this critical juncture, policymakers,
practitioners, and scholars will find this an invaluable resource
to understanding our current NC3 system, its relationship to
effective deterrence, what must be done to modernize NC3, and how
to ensure this transition is undertaken safely and successfully.
|
Southeaster (Paperback)
Haroldo Conti, Jon Lindsay Miles
|
R301
R253
Discovery Miles 2 530
Save R48 (16%)
|
Ships in 12 - 17 working days
|
'Neither the old man nor Boga ever said more than was needed. And
yet they understood each other perfectly.' Over the course of a
season, Boga and the old man work side by side on the sandbanks of
the Parana Delta, cutting reeds to sell to local basketweavers. But
when the old man falls sick and dies, Boga abandons himself
entirely to the river and the life of solitary drifting he has long
yearned for. Echoes of John Berger sound throughout the evocative
prose of this great Argentinian writer. A twentieth-century
classic, Southeaster is a central work in Haroldo Conti's oeuvre.
|
You may like...
Holy Fvck
Demi Lovato
CD
R435
Discovery Miles 4 350
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
|