0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

China and Cybersecurity - Espionage, Strategy, and Politics in the Digital Domain (Hardcover): Jon R. Lindsay, Tai Ming Cheung,... China and Cybersecurity - Espionage, Strategy, and Politics in the Digital Domain (Hardcover)
Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron
R3,995 Discovery Miles 39 950 Ships in 12 - 19 working days

China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber--attacks--predominantly from the United States. China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors--Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West--address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.

Cross-Domain Deterrence - Strategy in an Era of Complexity (Paperback): Erik Gartzke, Jon R. Lindsay Cross-Domain Deterrence - Strategy in an Era of Complexity (Paperback)
Erik Gartzke, Jon R. Lindsay
R1,601 Discovery Miles 16 010 Ships in 12 - 19 working days

The complexity of the twenty-first century threat landscape contrasts markedly with the bilateral nuclear bargaining context envisioned by classical deterrence theory. Nuclear and conventional arsenals continue to develop alongside anti-satellite programs, autonomous robotics or drones, cyber operations, biotechnology, and other innovations barely imagined in the early nuclear age. The concept of cross-domain deterrence (CDD) emerged near the end of the George W. Bush administration as policymakers and commanders confronted emerging threats to vital military systems in space and cyberspace. The Pentagon now recognizes five operational environments or so-called domains (land, sea, air, space, and cyberspace), and CDD poses serious problems in practice. In Cross-Domain Deterrence, Erik Gartzke and Jon R. Lindsay assess the theoretical relevance of CDD for the field of International Relations. As a general concept, CDD posits that how actors choose to deter affects the quality of the deterrence they achieve. Contributors to this volume include senior and junior scholars and national security practitioners. Their chapters probe the analytical utility of CDD by examining how differences across, and combinations of, different military and non-military instruments can affect choices and outcomes in coercive policy in historical and contemporary cases.

Information Technology and Military Power (Hardcover): Jon R. Lindsay Information Technology and Military Power (Hardcover)
Jon R. Lindsay
R1,070 Discovery Miles 10 700 Ships in 12 - 19 working days

Militaries with state-of-the-art information technology sometimes bog down in confusing conflicts. To understand why, it is important to understand the micro-foundations of military power in the information age, and this is exactly what Jon R. Lindsay's Information Technology and Military Power gives us. As Lindsay shows, digital systems now mediate almost every effort to gather, store, display, analyze, and communicate information in military organizations. He highlights how personnel now struggle with their own information systems as much as with the enemy. Throughout this foray into networked technology in military operations, we see how information practice-the ways in which practitioners use technology in actual operations-shapes the effectiveness of military performance. The quality of information practice depends on the interaction between strategic problems and organizational solutions. Information Technology and Military Power explores information practice through a series of detailed historical cases and ethnographic studies of military organizations at war. Lindsay explains why the US military, despite all its technological advantages, has struggled for so long in unconventional conflicts against weaker adversaries. This same perspective suggests that the US retains important advantages against advanced competitors like China that are less prepared to cope with the complexity of information systems in wartime. Lindsay argues convincingly that a better understanding of how personnel actually use technology can inform the design of command and control, improve the net assessment of military power, and promote reforms to improve military performance. Warfighting problems and technical solutions keep on changing, but information practice is always stuck in between.

Cross-Domain Deterrence - Strategy in an Era of Complexity (Hardcover): Erik Gartzke, Jon R. Lindsay Cross-Domain Deterrence - Strategy in an Era of Complexity (Hardcover)
Erik Gartzke, Jon R. Lindsay
R3,514 Discovery Miles 35 140 Ships in 12 - 19 working days

The complexity of the twenty-first century threat landscape contrasts markedly with the bilateral nuclear bargaining context envisioned by classical deterrence theory. Nuclear and conventional arsenals continue to develop alongside anti-satellite programs, autonomous robotics or drones, cyber operations, biotechnology, and other innovations barely imagined in the early nuclear age. The concept of cross-domain deterrence (CDD) emerged near the end of the George W. Bush administration as policymakers and commanders confronted emerging threats to vital military systems in space and cyberspace. The Pentagon now recognizes five operational environments or so-called domains (land, sea, air, space, and cyberspace), and CDD poses serious problems in practice. In Cross-Domain Deterrence, Erik Gartzke and Jon R. Lindsay assess the theoretical relevance of CDD for the field of International Relations. As a general concept, CDD posits that how actors choose to deter affects the quality of the deterrence they achieve. Contributors to this volume include senior and junior scholars and national security practitioners. Their chapters probe the analytical utility of CDD by examining how differences across, and combinations of, different military and non-military instruments can affect choices and outcomes in coercive policy in historical and contemporary cases.

China and Cybersecurity - Espionage, Strategy, and Politics in the Digital Domain (Paperback): Jon R. Lindsay, Tai Ming Cheung,... China and Cybersecurity - Espionage, Strategy, and Politics in the Digital Domain (Paperback)
Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron
R1,547 Discovery Miles 15 470 Ships in 12 - 19 working days

China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber--attacks--predominantly from the United States. China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors--Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West--address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Idle Word - Short Religious Essays…
Edward Meyrick Goulburn Paperback R486 Discovery Miles 4 860
Singer Upholstery Basics Plus - Complete…
Steve Cone Spiral bound R726 R659 Discovery Miles 6 590
Cooking Lekka - Comforting Recipes For…
Thameenah Daniels Paperback R300 R275 Discovery Miles 2 750
New Atlantis
Brent Golembiewski Hardcover R750 Discovery Miles 7 500
The Village Indian
Vanessa Govender Paperback R320 R270 Discovery Miles 2 700
Teaching-Learning dynamics
Monica Jacobs, Ntombizolile Vakalisa, … Paperback R618 Discovery Miles 6 180
Fighting For The Dream
R.W. Johnson Paperback  (3)
R372 Discovery Miles 3 720
Manufacturing of Nanocomposites with…
Vikas Mittal Hardcover R4,666 Discovery Miles 46 660
The Case Against Sugar
Gary Taubes Paperback R449 R420 Discovery Miles 4 200
Does the Church Still Need Apostles and…
Jim Thomas Hardcover R688 R609 Discovery Miles 6 090

 

Partners