ShopSpell

Conquest in Cyberspace National Security and Information Warfare [Hardcover]

$94.99       (Free Shipping)
62 available
  • Category: Books (Political Science)
  • Author:  Libicki, Martin C.
  • Author:  Libicki, Martin C.
  • ISBN-10:  0521871603
  • ISBN-10:  0521871603
  • ISBN-13:  9780521871600
  • ISBN-13:  9780521871600
  • Publisher:  Cambridge University Press
  • Publisher:  Cambridge University Press
  • Pages:  336
  • Pages:  336
  • Binding:  Hardcover
  • Binding:  Hardcover
  • Pub Date:  01-May-2007
  • Pub Date:  01-May-2007
  • SKU:  0521871603-11-MPOD
  • SKU:  0521871603-11-MPOD
  • Item ID: 100745350
  • Seller: ShopSpell
  • Ships in: 2 business days
  • Transit time: Up to 5 business days
  • Delivery by: Apr 10 to Apr 12
  • Notes: Brand New Book. Order Now.
This book shows the risks and protections cyberspace offers for national security and information warfare.Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, steal their information, corrupt their workings, and shut them down. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve.Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, steal their information, corrupt their workings, and shut them down. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve.With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve.1. Introduction; 2. Hostile conquest as information warfare; 3. Information warfare as noise; 4. Information warfare against defense systems; 5. Information warfare against command and control; 6. Friendly conquest in cyberspace; 7. Friendly conquest using global systems; 8. Retail conquest in cyberspace; 9. From intimacy, vulnerability; 10. Talking conquest in cyberspace; 11. Managing conquest in cyberspace; Appendix. Why cyberspace is likely to gain consequence. Libicki recognizes the grand problem in discourse on the topic of cyberwarfare: the incredible breadth of topical space....l£'
Add Review