You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Zero-day vulnerabilities--software vulnerabilities for which no patch or fix has been publicly released-- and their exploits are useful in cyber operations--whether by criminals, militaries, or governments--as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that could augment conventional proxy examples and expert opinion, complement current efforts to create a framework for deciding whether to disclose or retain a cache of zero-day vulnerabilities and exploits, inform ongoing policy debates regarding stockpiling and vulnerability disclosure, and add extra context for those examining the implications and result...
Over the past decade, numerous states have declared cyberspace as a new domain of warfare, sought to develop a military cyber strategy and establish a cyber command. These developments have led to much policy talk and concern about the future of warfare as well as the digital vulnerability of society. No Shortcuts provides a level-headed view of where we are in the militarization of cyberspace.In this book, Max Smeets bridges the divide between technology and policy to assess the necessary building blocks for states to develop a military cyber capacity. Smeets argues that for many states, the barriers to entry into conflict in cyberspace are currently too high. Accompanied by a wide range of empirical examples, Smeets shows why governments abilities to develop military cyber capabilities might change over time and explains the limits of capability transfer by states and private actors.
As frontier artificial intelligence (AI) models—that is, models that match or exceed the capabilities of the most advanced models at the time of their development—become more capable, protecting them from theft and misuse will become more important. The authors of this report explore what it would take to protect model weights—the learnable parameters that encode the core intelligence of an AI—from theft by a variety of potential attackers.
Can American health insurance survive? In The Transformation of American Health Insurance, Troyen A. Brennan traces the historical evolution of public and private health insurance in the United States from the first Blue Cross plans in the late 1930s to reforms under the Biden administration. In analyzing this evolution, he finds long-term trends that form the basis for his central argument: that employer-sponsored insurance is becoming unsustainably expensive, and Medicare for All will emerge as the sole source of health insurance over the next two decades. After thirty years of leadership in health care and academia, Brennan argues that Medicare for All could act as a single-payer program ...
None
Cultural history and themendment : New York Times v. Sullivan and its times / Kermit L. Hall -- New directions in American constitutional history -- Words as hard as cannon-balls : women's rights agitation -- And liberty of speech in nineteenth-century America / Sandra F. VanBurkleo -- Race, state, market, and civil society in constitutional history / Mark Tushnet -- Constitutional history and the "cultural turn" : cross -- Examining the legal-reelist narratives of Henry Fonda / Norman L. Rosenberg -- Contributors
In Subversion, Lennart Maschmeyer provides a powerful new theory and analysis of an age-old concept. While a strategy of subversion offers great strategic promise in theory, it faces an underappreciated set of challenges that limit its strategic value in practice. Drawing from two major cases--the KGB's use of traditional subversion methods to crush the Prague Spring in 1968 and Russia's less successful use of cyberwarfare against Ukraine since 2014--Maschmeyer demonstrates both the benefits and weaknesses of the approach. While many believe that today's cyber-based subversion campaigns offer new strategic opportunities, they also come with their own challenges. Because of these disadvantages, cyber operations continue to fall short of expectations--most recently in the Russo-Ukrainian war. By showing that traditional subversion methods remain the more potent threat, Subversion forces us to reconsider our fears of the subversive potential of cyberwar.
he first overview of US NC3 since the 1980s, Nuclear Command, Control, and Communications explores the current NC3 system and its vital role in ensuring effective deterrence, contemporary challenges posed by cyber threats, new weapons technologies, and the need to modernize the United States’ Cold War–era system of systems.
Almost two decades after the events of 9/11, this Handbook offers a comprehensive insight into the evolution and development of terrorism and insurgency since then. Gathering contributions from a broad range of perspectives, it both identifies new technological developments in terrorism and insurgency, and addresses the distinct state responses to the threat of political, or religiously motivated violence; not only in the Middle East and Europe, but also in Africa, South and Southeast Asia, and North and South America.
Until recently, the Arctic was almost impossible for anyone other than indigenous peoples and explorers to traverse. Pervasive Arctic sea ice and harsh climatological conditions meant that the region was deemed incapable of supporting industrial activity or a Western lifestyle. In the last decade, however, that longstanding reality has been dramatically and permanently altered. Receding sea ice, coupled with growing geopolitical disputes over Arctic resources, territory, and transportation channels, has stimulated efforts to exploit newly-open waterways, to identify and extract desirable resources, and to leverage industrial, commercial, and transportation opportunities emerging throughout t...