The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas.
The first section provides a broad foundation and overview of the subject by identifying key policy issues, establishing a common vocabulary, and proposing an initial version of a theory of cyberpower. The second section identifies and explores possible changes in cyberspace over the next fifteen years by assessing cyber infrastructure and security challenges. The third section analyzes the potential impact of changes in cyberspace on the military and informational levers of power. The fourth section addresses the extent to which changes in cyberspace serve to empower key entities such as transnational criminals, terrorists, and nation-states. The final section examines key institutional factors, which include issues concerning governance, legal dimensions, critical infrastructure protection, and organization.
Cyberpower and National Security frames the key issues concerned and identifies the important questions involved in building the human capacity to address cyber issues, balancing civil liberties with national security considerations, and developing the international partnerships needed to address cyber challenges. With more than two dozen contributors, Cyberpower and National Security covers it all.
Cyberpower and National Security
📄 Viewing lite version
Full site ›
Book Details
Author(s)Kramer, Franklin
PublisherPotomac Books
ISBN / ASIN1597974234
ISBN-139781597974233
AvailabilityIn stock on May 17, 2021. Order it now.
Sales Rank510,688
CategoryComputers
MarketplaceUnited States 🇺🇸
Description ▲
Similar Products ▼
- Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
- Cybersecurity and Cyberwar: What Everyone Needs to Know®
- Cyber War: The Next Threat to National Security and What to Do About It
- Research Methodology: A Step-by-Step Guide for Beginners
- A Research Primer for Technical Communication: Methods, Exemplars, and Analyses
- Wars of Disruption and Resilience: Cybered Conflict, Power, and National Security (Studies in Security and International Affairs Ser.)
- Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
- Wired for War: The Robotics Revolution and Conflict in the 21st Century
- Drone Wars: Transforming Conflict, Law, And Policy
- Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware
More Books in Computers
The Good Web Site Guide 2006: The Completely Revised, …
View
The Pentium Microprocessor
View
Advanced Intel Microprocessors: 80286, 80386, And 80486
View
Differential Equations: Matrices and Models
View
Digital Experiments: Emphasizing Troubleshooting (Merr…
View
Data Structures for Computer Information Systems
View
The Little LISPer, Third Edition
View
Inside Networks
View
Computer Graphics Using Open GL (2nd Edition)
View