0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (2)
  • R500 - R1,000 (13)
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 18 of 18 matches in All Departments

What Makes Industries Strategic - A Perspective on Technology, Economic Development, and Defense (Paperback): Martin C. Libicki What Makes Industries Strategic - A Perspective on Technology, Economic Development, and Defense (Paperback)
Martin C. Libicki
R452 Discovery Miles 4 520 Ships in 10 - 15 working days

The Secretary of the Treasury has applied his attention to the subject of manufactures; and particularly to the means of promoting such as will tend to render the United States independent on foreign nations for military and essential supplies.

Illuminating Tomorrow's War (Paperback): Martin C. Libicki Illuminating Tomorrow's War (Paperback)
Martin C. Libicki
R514 Discovery Miles 5 140 Ships in 10 - 15 working days

In the weeks leading up to Desert Storm, anxious analysts tried to forecast the course of the war by counting what the coalition and Iraq each brought to the battlefield: they have this many men, we have that many men; they have this much armor, we have that much armor; their air fleet is this big; ours is that big. Few doubted which side would prevail in battle, but many analysts were not so sure the war could be won swiftly and with acceptable casualties.

Dominant Battlespace Knowledge (Paperback): Stuart E. Johnson, Martin C. Libicki Dominant Battlespace Knowledge (Paperback)
Stuart E. Johnson, Martin C. Libicki; Introduction by Admiral William A Owens
R490 Discovery Miles 4 900 Ships in 10 - 15 working days

The Department of Defense has been successfully exploiting rapidly developing advances in information technology for military gain. On tomorrow's multidimensional battlefield - or "battlespace" - the increased density, acuity, and connectivity of sensors and many other information devices may allow U. S. Armed Forces to see almost everything worth seeing in real or near-real time. Such enhanced vision of the battlespace is no doubt a significant military advantage, but a question remains: How to we achieve dominant battlefield knowledge, namely the ability to understand what we see and act on it decisively? The papers collected here address the most critical aspects of that problem - to wit: If the United States develops the means to acquire dominant battlespace knowledge (DBK), how might that affect the way it goes to war, the circumstances under which force can and will be used, the purposes for its employment, and the resulting alterations of the global geomilitary environment? Of particular interest is how the authors view the influence of DBK in light of the shift from global and regional stability issues that marks the post-Cold War world. While no definitive answer has yet emerged, it is clear that the implications of so profound a change in military technology are critical to the structure and function of the U.S. Armed Forces. In working toward a definitive answer, the authors of this volume make an important contribution to a debate whose resolution will shape the decades to come. Ervin J. Rokke Lieutenant General, United States Air Force President, National Defense University

Defending Cyberspace and Other Metaphors (Paperback): Martin C. Libicki Defending Cyberspace and Other Metaphors (Paperback)
Martin C. Libicki
R598 Discovery Miles 5 980 Ships in 10 - 15 working days

Information warfare, as any casual observer of the Pentagon can attest, remains a hot-button topic in the military community. Thus does war follow commerce into cyberspace, pitting foes against one another for control of this clearly critical high ground. But does this facile comparison have a basis in reality? In this iconoclastic spirit, the six essays in this book are characterized by a continuing search for the meaning of information warfare.

The Defender's Dilemma - Charting a Course Toward Cybersecurity (Paperback): Martin C. Libicki, Lillian Ablon, Tim Webb The Defender's Dilemma - Charting a Course Toward Cybersecurity (Paperback)
Martin C. Libicki, Lillian Ablon, Tim Webb
R538 Discovery Miles 5 380 Ships in 9 - 15 working days
The U.S.-China Military Scorecard - Forces, Geography, and the Evolving Balance of Power, 1996-2017 (Paperback): Eric... The U.S.-China Military Scorecard - Forces, Geography, and the Evolving Balance of Power, 1996-2017 (Paperback)
Eric Heginbotham, Michael Nixon, Forrest E. Morgan, Jacob L Heim, Jeff Hagen, …
R2,464 Discovery Miles 24 640 Ships in 10 - 15 working days
Internet Freedom and Political Space (Paperback): Olesya Tkacheva, Lowell H. Schwartz, Martin C. Libicki, Julie E. Taylor,... Internet Freedom and Political Space (Paperback)
Olesya Tkacheva, Lowell H. Schwartz, Martin C. Libicki, Julie E. Taylor, Jeffrey Martini, …
R999 Discovery Miles 9 990 Ships in 10 - 15 working days

The Internet is a new battleground between governments that censor online content and those who advocate freedom for all to browse, post, and share information online. This report examines how Internet freedom may transform state-society relations in nondemocratic regimes, using case studies of China, Egypt, Russia, and Syria, and also draws parallels between Internet freedom and Radio Free Europe programs during the Cold War.

An Assessment of the Assignments and Arrangements of the Executive Agent for DOD Biometrics and Status Report on the DOD... An Assessment of the Assignments and Arrangements of the Executive Agent for DOD Biometrics and Status Report on the DOD Biometrics Enterprise (Paperback)
Douglas Shontz, Martin C. Libicki, Rena Rudavsky, Melissa A. Bradley
R712 Discovery Miles 7 120 Ships in 10 - 15 working days

As the need to identify known and suspected combatants has elevated the importance of biometrics in the Department of Defense (DoD), RAND researchers assessed how current activities are supporting end users and how DoD is preparing to focus biometrics on different missions. As overseas contingency operations wind down, DoD's biometrics program must move in a new direction, and continued funding must be justified in new ways.

What Should be Classified? - A Framework with Application to the Global Force Management Data Initiative (Paperback): Martin C.... What Should be Classified? - A Framework with Application to the Global Force Management Data Initiative (Paperback)
Martin C. Libicki, Brian A. Jackson, David R. Frelinger, Beth E. Lachman, Cesse Ip
R635 Discovery Miles 6 350 Ships in 10 - 15 working days

The Global Force Management Data Initiative was launched to improve aggregation of unclassified force-structure data. Aggregation, though, raised concerns about classification because the system might be attractive to a potential adversary. The authors develop a framework for evaluating classification decisions to determine that, while overall classification is not indicated, the inclusion of some data will require careful consideration.

Influences on the Adoption of Multifactor Authentication (Paperback): Martin C. Libicki, Edward Balkovich, Brian A. Jackson,... Influences on the Adoption of Multifactor Authentication (Paperback)
Martin C. Libicki, Edward Balkovich, Brian A. Jackson, Rena Rudavsky, Katharine Watkins Webb
R728 Discovery Miles 7 280 Ships in 10 - 15 working days

Passwords are proving less and less capable of protecting computer systems from abuse. Multifactor authentication (MFA) which combines something you know (e.g., a PIN), something you have (e.g., a token), and/or something you are (e.g., a fingerprint) is increasingly being required. This report investigates why organizations choose to adopt or not adopt MFA and where they choose to use it.

Cyberdeterrence and Cyberwar (Paperback): Martin C. Libicki Cyberdeterrence and Cyberwar (Paperback)
Martin C. Libicki
R984 Discovery Miles 9 840 Ships in 10 - 15 working days

The protection of cyberspace, the information medium, has become a vital national interest because of its importance both to the economy and to military power. An attacker may tamper with networks to steal information for the money or to disrupt operations. Future wars are likely to be carried out, in part or perhaps entirely, in cyberspace. It might therefore seem obvious that maneuvering in cyberspace is like maneuvering in other media, but nothing would be more misleading. Cyberspace has its own laws; for instance, it is easy to hide identities and difficult to predict or even understand battle damage, and attacks deplete themselves quickly. Cyberwar is nothing so much as the manipulation of ambiguity. The author explores these topics in detail and uses the results to address such issues as the pros and cons of counterattack, the value of deterrence and vigilance, and other actions governments can take to protect themselves in the face of deliberate cyberattack. For more than 60 years, decisionmakers in the public and private sectors have turned to the RAND Corporation for objective analysis and effective solutions that address the challenges facing the nation and the world.

How Terrorist Groups End - Lessons for Countering Al Qa'ida (Paperback): Seth G Jones, Martin C. Libicki How Terrorist Groups End - Lessons for Countering Al Qa'ida (Paperback)
Seth G Jones, Martin C. Libicki
R987 Discovery Miles 9 870 Ships in 10 - 15 working days

All terrorist groups eventually end. But how? Most modern groups have ended because they joined the political process or local police and intelligence agencies arrested or killed key members. This has significant implications for dealing with al Qa'ida and suggests fundamentally rethinking post-9/11 U.S. counterterrorism strategy: Policing and intelligence, not military force, should form the backbone of U.S. efforts against al Qa'ida.All terrorist groups end. But how do they end? Most groups since 1968 have ended because they joined the political process or are defeated by police and intelligence services. This has significant implications for countering al Qa'ida.

Byting Back - Regaining Information Superiority Against 21st-century Insurgents (Paperback): Martin C. Libicki Byting Back - Regaining Information Superiority Against 21st-century Insurgents (Paperback)
Martin C. Libicki
R711 Discovery Miles 7 110 Ships in 10 - 15 working days

Libicki et al. argue that information collection requirements and systems for counterinsurgency are important because the community that conducts counterinsurgency crosses national and institutional boundaries and because the indigenous population plays a large role in determining the outcome of an insurgency. They then demonstrate what this focus implies for counterinsurgency requirements, collection, networking, and systems design.

Exploring Terrorist Targeting Preferences (Paperback): Martin C. Libicki Exploring Terrorist Targeting Preferences (Paperback)
Martin C. Libicki
R611 Discovery Miles 6 110 Ships in 10 - 15 working days

Governments spend billions to protect against terrorism. Might it help to understand what al Qaeda would achieve with each specific attack? This book examines various hypotheses of terrorist targeting: is it (1) to coerce, (2) to damage economies, (3) to rally the faithful, or (4) a decision left to affiliates? This book analyzes past attacks, post hoc justifications, and expert opinion to weigh each hypothesis.

Conquest in Cyberspace - National Security and Information Warfare (Hardcover): Martin C. Libicki Conquest in Cyberspace - National Security and Information Warfare (Hardcover)
Martin C. Libicki
R2,461 Discovery Miles 24 610 Ships in 10 - 15 working days

With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The author also investigates how far 'friendly conquest' in cyberspace extends, such as the power to persuade users to adopt new points of view. He discusses the role of public policy in managing cyberspace conquests and shows how the Internet is becoming more ubiquitous and complex, such as in the use of artificial intelligence.

Conquest in Cyberspace - National Security and Information Warfare (Paperback): Martin C. Libicki Conquest in Cyberspace - National Security and Information Warfare (Paperback)
Martin C. Libicki
R1,152 Discovery Miles 11 520 Ships in 10 - 15 working days

With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The author also investigates how far 'friendly conquest' in cyberspace extends, such as the power to persuade users to adopt new points of view. He discusses the role of public policy in managing cyberspace conquests and shows how the Internet is becoming more ubiquitous and complex, such as in the use of artificial intelligence.

Root Cause Analyses of Nunn-Mccurdy Breaches - Excalibur Artillery Projectile and the Navy Enterprise Resource Planning... Root Cause Analyses of Nunn-Mccurdy Breaches - Excalibur Artillery Projectile and the Navy Enterprise Resource Planning Program, with an Approach to Analyzing Complexity and Risk (Paperback)
Irv Blickstein, Jeffrey A. Drezner, Martin C. Libicki, Brian McInnis, Megan McKernan, …
R914 Discovery Miles 9 140 Out of stock
Markets for Cybercrime Tools and Stolen Data - Hackers' Bazaar (Paperback): Lillian Ablon, Martin C. Libicki, Andrea A... Markets for Cybercrime Tools and Stolen Data - Hackers' Bazaar (Paperback)
Lillian Ablon, Martin C. Libicki, Andrea A Golay
R615 Discovery Miles 6 150 Out of stock
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Not available
Ab Wheel
R209 R149 Discovery Miles 1 490
Gotcha Gotcha Scorch Watch (Gents)
R329 R303 Discovery Miles 3 030
Nuovo 1/2/3 Car Seat (Black)
R1,999 R1,703 Discovery Miles 17 030
Kendall Office Chair (Green)
 (1)
R1,699 R1,346 Discovery Miles 13 460
Mellerware Plastic Oscilating Floor Fan…
 (2)
R552 Discovery Miles 5 520
Docking Edition Multi-Functional…
R1,099 R799 Discovery Miles 7 990
Jabra Elite 5 Hybrid ANC True Wireless…
R2,899 R2,399 Discovery Miles 23 990
Tipping Point: Turmoil Or Reform…
Raymond Parsons Paperback R300 R215 Discovery Miles 2 150
Bestway Beach Ball (51cm)
 (2)
R26 Discovery Miles 260

 

Partners