Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

The Evolution of Strategy
  • Language: en

The Evolution of Strategy

Is there a 'Western way of war' which pursues battles of annihilation and single-minded military victory? Is warfare on a path to ever greater destructive force? This magisterial account answers these questions by tracing the history of Western thinking about strategy - the employment of military force as a political instrument - from antiquity to the present day. Assessing sources from Vegetius to contemporary America, and with a particular focus on strategy since the Napoleonic Wars, Beatrice Heuser explores the evolution of strategic thought, the social institutions, norms and patterns of behaviour within which it operates, the policies that guide it and the cultures that influence it. Ranging across technology and warfare, total warfare and small wars as well as land, sea, air and nuclear warfare, she demonstrates that warfare and strategic thinking have fluctuated wildly in their aims, intensity, limitations and excesses over the past two millennia.

Leading Issues in Information Warfare and Security Research
  • Language: en
  • Pages: 241

Leading Issues in Information Warfare and Security Research

As virtually every aspect of society becomes increasingly dependent on information and communications technology, so our vulnerability to attacks on this technology increases. This is a major theme of this collection of leading edge research papers. At the same time there is another side to this issue, which is if the technology can be used against society by the purveyors of malware etc., then technology may also be used positively in the pursuit of society’s objectives. Specific topics in the collection include Cryptography and Steganography, Cyber Antagonism, Information Sharing Between Government and Industry as a Weapon, Terrorist Use of the Internet, War and Ethics in Cyberspace to name just a few. The papers in this book take a wide ranging look at the more important issues surrounding the use of information and communication technology as it applies to the security of vital systems that can have a major impact on the functionality of our society. This book includes leading contributions to research in this field from 9 different countries and an introduction to the subject by Professor Julie Ryan from George Washington University in the USA.

Cyber Sovereignty
  • Language: en
  • Pages: 267

Cyber Sovereignty

Governments across the globe find themselves in an exploratory phase as they probe the limits of their sovereignty in the cyber domain. Cyberspace is a singular environment that is forcing states to adjust their behavior to fit a new arena beyond the four traditional domains (air, sea, space, and land) to which the classic understanding of state sovereignty applies. According to Lucie Kadlecová, governments must implement a more adaptive approach to keep up with rapid developments and innovations in cyberspace in order to truly retain their sovereignty. This requires understanding the concept of sovereignty in a more creative and flexible manner. Kadlecová argues that the existence of sove...

ECCWS2016-Proceedings fo the 15th European Conference on Cyber Warfare and Security
  • Language: en
  • Pages: 459

ECCWS2016-Proceedings fo the 15th European Conference on Cyber Warfare and Security "

These proceedings represent the work of researchers participating in the 15th European Conference on Cyber Warfare and Security (ECCWS 2016) which is being hosted this year by the Universitat der Bundeswehr, Munich, Germany on the 7-8 July 2016. ECCWS is a recognised event on the International research conferences calendar and provides a valuable plat-form for individuals to present their research findings, display their work in progress and discuss conceptual and empirical advances in the area of Cyberwar and Cyber Security. It provides an important opportunity for researchers and managers to come together with peers to share their experiences of using the varied and ex-panding range of Cyb...

Maintaining Arctic Cooperation with Russia
  • Language: en
  • Pages: 102

Maintaining Arctic Cooperation with Russia

This report examines security challenges that could alter Russia's current cooperative stance in the Arctic, explores how these could undermine Arctic cooperation, and offers recommendations for the U.S. government to manage risks to cooperation.

Hybrid Threats, Cyberterrorism and Cyberwarfare
  • Language: en
  • Pages: 202

Hybrid Threats, Cyberterrorism and Cyberwarfare

  • Type: Book
  • -
  • Published: 2023-11-22
  • -
  • Publisher: CRC Press

Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart from the advantages the internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes the same destruction that a physical war would also do. A hybrid threat is an umbrella term encompassing a wide variety of existing adverse circumstances and actions, such as terrorism, migration, piracy, corruption, ethnic conflict, etc., and is not exclusively a tool of asymmetric or non-state actors, but can be applied by state and non-state actors alike....

ECCWS 2021 20th European Conference on Cyber Warfare and Security
  • Language: en
  • Pages: 646

ECCWS 2021 20th European Conference on Cyber Warfare and Security

Conferences Proceedings of 20th European Conference on Cyber Warfare and Security

The Liberal Internet in the Postliberal Era
  • Language: en
  • Pages: 496

The Liberal Internet in the Postliberal Era

None

ICIW 2013 Proceedings of the 8th International Conference on Information Warfare and Security
  • Language: en
  • Pages: 304
Intelligence in Democratic Transitions
  • Language: en
  • Pages: 291

Intelligence in Democratic Transitions

A groundbreaking comparative analysis of three understudied cases of intelligence democratization revealing new insights into main barriers to reform when states transition from authoritarianism Reforming the intelligence services is essential when a state transitions from authoritarianism to democracy. But which areas should be reformed, how do we know when there has been real transformation, and how and where do authoritarian legacies persist? Intelligence in Democratic Transitions is a comparative examination of the democratic transitions of Portugal, Greece, and Spain starting in the 1970s. Although these three countries began their transitions around the same time, they present signific...