You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
On 9/11 the U.S. had effectively no counterterrorism doctrine. Fast forward ten years: Osama bin Laden is dead; al Qaeda is organizationally ruined and pinned in the tribal areas of Pakistan and Afghanistan; there has been no major attack on American soil; and while there has been at least one instance of a massive planned attack, it was crushed by the greatest international collaboration of intelligence services seen since the end of the Cold War. It's been a remarkable transformation. Aki Peritz and Eric Rosenbach have experienced first-hand the monumental strategy changes in our country's counterterrorism strategy within the intelligence, defense, and political communities. In this book, they show how America learned to be very good at taking on the terrorists, often one at a time, in ever more lethally incisive operations. They offer new details behind some headlines from the last decade. They are frank about the mistakes that have been made. And they explain how a concept coined by General Grant during the Civil War has been reinvented in the age of satellite technology to manage a globally distributed foe, allowing the U.S. to find, fix, and finish its enemies.
"Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization's overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident's potential impact on overall operations. In a world of ...
"Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization's overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident's potential impact on overall operations. In a world of ...
None
None
None
A riveting inside look at an elite unit within the Pentagon—the Defense Innovation Unit, also known as Unit X—whose mission is to bring Silicon Valley’s cutting-edge technology to America’s military: from the two men who launched the unit. A vast and largely unseen transformation of how war is fought as profound as the invention of gunpowder or advent of the nuclear age is occurring. Flying cars that can land like helicopters, artificial intelligence-powered drones that can fly into buildings and map their interiors, microsatellites that can see through clouds and monitor rogue missile sites—all these and more are becoming part of America’s DIU-fast-tracked arsenal. Until recentl...
"In this Council Special Report, Robert K. Knake briefly examines the technological decisions that have enabled both the Internet's spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, he outlines an agenda that the United States can pursue in concert with its allies on the international stage. This agenda, addressing cyber warfare, cyber crime, and state-sponsored espionage, should, he writes, be pursued through both technological and legal means. He urges first that the United States empower experts to confront the fundamental security issues at the heart of the Internet's design. Then he sketches the legal tools necessary to address both cyber crime and state-sponsored activities, including national prohibitions of cyber crime, multilateral mechanisms to prevent and prosecute cyberattacks, and peacetime norms protecting critical civilian systems, before describing the bureaucratic reforms the United States should make to implement effectively these changes." --From publisher description.
None
At a moment when both think tanks and experts are being questioned, significant policy and technology disruptions have called into question the value and efficacy of policy advice. Within that context, Dr. McGann launched this book to examine the future of think tanks and policy advice around the world with a series of authoritative reflections written by the presidents of some of the leading think tanks in the United States. The book explores the challenges think tanks face today in an information rich and highly competitive operating environment that includes: the impact of technology, big data and artificial intelligence, competition from advocacy groups and public relations firms, increased polarization of politics and major changes in how think tanks are funded.