0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (2)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Cross-Domain Deterrence - Strategy in an Era of Complexity (Paperback): Erik Gartzke, Jon R. Lindsay Cross-Domain Deterrence - Strategy in an Era of Complexity (Paperback)
Erik Gartzke, Jon R. Lindsay
R1,517 Discovery Miles 15 170 Ships in 12 - 17 working days

The complexity of the twenty-first century threat landscape contrasts markedly with the bilateral nuclear bargaining context envisioned by classical deterrence theory. Nuclear and conventional arsenals continue to develop alongside anti-satellite programs, autonomous robotics or drones, cyber operations, biotechnology, and other innovations barely imagined in the early nuclear age. The concept of cross-domain deterrence (CDD) emerged near the end of the George W. Bush administration as policymakers and commanders confronted emerging threats to vital military systems in space and cyberspace. The Pentagon now recognizes five operational environments or so-called domains (land, sea, air, space, and cyberspace), and CDD poses serious problems in practice. In Cross-Domain Deterrence, Erik Gartzke and Jon R. Lindsay assess the theoretical relevance of CDD for the field of International Relations. As a general concept, CDD posits that how actors choose to deter affects the quality of the deterrence they achieve. Contributors to this volume include senior and junior scholars and national security practitioners. Their chapters probe the analytical utility of CDD by examining how differences across, and combinations of, different military and non-military instruments can affect choices and outcomes in coercive policy in historical and contemporary cases.

Information Technology and Military Power (Hardcover): Jon R. Lindsay Information Technology and Military Power (Hardcover)
Jon R. Lindsay
R1,081 R960 Discovery Miles 9 600 Save R121 (11%) Ships in 12 - 17 working days

Militaries with state-of-the-art information technology sometimes bog down in confusing conflicts. To understand why, it is important to understand the micro-foundations of military power in the information age, and this is exactly what Jon R. Lindsay's Information Technology and Military Power gives us. As Lindsay shows, digital systems now mediate almost every effort to gather, store, display, analyze, and communicate information in military organizations. He highlights how personnel now struggle with their own information systems as much as with the enemy. Throughout this foray into networked technology in military operations, we see how information practice-the ways in which practitioners use technology in actual operations-shapes the effectiveness of military performance. The quality of information practice depends on the interaction between strategic problems and organizational solutions. Information Technology and Military Power explores information practice through a series of detailed historical cases and ethnographic studies of military organizations at war. Lindsay explains why the US military, despite all its technological advantages, has struggled for so long in unconventional conflicts against weaker adversaries. This same perspective suggests that the US retains important advantages against advanced competitors like China that are less prepared to cope with the complexity of information systems in wartime. Lindsay argues convincingly that a better understanding of how personnel actually use technology can inform the design of command and control, improve the net assessment of military power, and promote reforms to improve military performance. Warfighting problems and technical solutions keep on changing, but information practice is always stuck in between.

Cross-Domain Deterrence - Strategy in an Era of Complexity (Hardcover): Erik Gartzke, Jon R. Lindsay Cross-Domain Deterrence - Strategy in an Era of Complexity (Hardcover)
Erik Gartzke, Jon R. Lindsay
R3,347 Discovery Miles 33 470 Ships in 12 - 17 working days

The complexity of the twenty-first century threat landscape contrasts markedly with the bilateral nuclear bargaining context envisioned by classical deterrence theory. Nuclear and conventional arsenals continue to develop alongside anti-satellite programs, autonomous robotics or drones, cyber operations, biotechnology, and other innovations barely imagined in the early nuclear age. The concept of cross-domain deterrence (CDD) emerged near the end of the George W. Bush administration as policymakers and commanders confronted emerging threats to vital military systems in space and cyberspace. The Pentagon now recognizes five operational environments or so-called domains (land, sea, air, space, and cyberspace), and CDD poses serious problems in practice. In Cross-Domain Deterrence, Erik Gartzke and Jon R. Lindsay assess the theoretical relevance of CDD for the field of International Relations. As a general concept, CDD posits that how actors choose to deter affects the quality of the deterrence they achieve. Contributors to this volume include senior and junior scholars and national security practitioners. Their chapters probe the analytical utility of CDD by examining how differences across, and combinations of, different military and non-military instruments can affect choices and outcomes in coercive policy in historical and contemporary cases.

China and Cybersecurity - Espionage, Strategy, and Politics in the Digital Domain (Hardcover): Jon R. Lindsay, Tai Ming Cheung,... China and Cybersecurity - Espionage, Strategy, and Politics in the Digital Domain (Hardcover)
Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron
R4,065 Discovery Miles 40 650 Ships in 12 - 17 working days

China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber--attacks--predominantly from the United States. China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors--Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West--address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.

China and Cybersecurity - Espionage, Strategy, and Politics in the Digital Domain (Paperback): Jon R. Lindsay, Tai Ming Cheung,... China and Cybersecurity - Espionage, Strategy, and Politics in the Digital Domain (Paperback)
Jon R. Lindsay, Tai Ming Cheung, Derek S. Reveron
R1,465 Discovery Miles 14 650 Ships in 12 - 17 working days

China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber--attacks--predominantly from the United States. China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors--Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West--address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
24K Magic
Bruno Mars CD  (1)
R177 R108 Discovery Miles 1 080
The Rise and Fall of a White Collar…
Nick Nevern, Simon Phillips, … Blu-ray disc  (1)
R60 Discovery Miles 600
Frozen - Blu-Ray + DVD
Blu-ray disc R330 Discovery Miles 3 300
Multifunction Water Gun - Gladiator
R399 R379 Discovery Miles 3 790
Xbox One Replacement Case
 (8)
R53 Discovery Miles 530
Multi-Functional Bamboo Standing Laptop…
R1,399 R669 Discovery Miles 6 690
Sylvanian Families - Walnut Squirrel…
R749 R579 Discovery Miles 5 790
Speak Now - Taylor's Version
Taylor Swift CD R496 Discovery Miles 4 960
Estee Lauder Beautiful Belle Eau De…
R2,077 R1,535 Discovery Miles 15 350
Golf Groove Sharpener (Black)
R249 Discovery Miles 2 490

 

Partners