You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"Confronting Cyber Risk: An Embedded Endurance Strategy for Cybersecurity is a practical leadership handbook defining a new strategy for improving cybersecurity and mitigating cyber risk. Written by two leading experts with extensive professional experience in cybersecurity, the book provides CEOs and cyber newcomers alike with novel, concrete guidance on how to implement a cutting-edge strategy to mitigate an organization's overall risk to malicious cyberattacks. Using short, real-world case studies, the book highlights the need to address attack prevention and the resilience of each digital asset while also accounting for an incident's potential impact on overall operations. In a world of ...
Two intelligence experts with unique access to inside sources reveal the fascinating story behind the evolution of AmericaÕs new, effective approach to counterterrorism
The sixth edition of this classic text continues its popular interdisciplinary approach to the topic of leadership by examining fundamental elements of military leadership: the 'process' of leadership, the dynamic personal interactions between leader and followers, and the individual and organizational values that foster effective military leadership. Military Leadership provides a thoroughly reconsidered and greatly expanded mix of classic and contemporary articles as well as original essays, with authors representing all of the services. Incisive introductory essays to each section highlight themes and connections. Eric B. Rosenbach joins the editorial team for this edition, helping infuse the text with fresh perspectives. The essays of the sixth edition confront the kudos and criticisms that surround military leadership today, offer international viewpoints, and relate military leadership to contemporary leadership theory and approaches.
A riveting inside look at an elite unit within the Pentagon—the Defense Innovation Unit, also known as Unit X—whose mission is to bring Silicon Valley’s cutting-edge technology to America’s military: from the two men who launched the unit. A vast and largely unseen transformation of how war is fought as profound as the invention of gunpowder or advent of the nuclear age is occurring. Flying cars that can land like helicopters, artificial intelligence-powered drones that can fly into buildings and map their interiors, microsatellites that can see through clouds and monitor rogue missile sites—all these and more are becoming part of America’s DIU-fast-tracked arsenal. Until recentl...
Cyber Mercenaries explores how and why states use hackers as proxies to project power through cyberspace.
"In this Council Special Report, Robert K. Knake briefly examines the technological decisions that have enabled both the Internet's spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, he outlines an agenda that the United States can pursue in concert with its allies on the international stage. This agenda, addressing cyber warfare, cyber crime, and state-sponsored espionage, should, he writes, be pursued through both technological and legal means. He urges first that the United States empower experts to confront the fundamental security issues at the heart of the Internet's design. Then he sketches the legal tools necessary to address both cyber crime and state-sponsored activities, including national prohibitions of cyber crime, multilateral mechanisms to prevent and prosecute cyberattacks, and peacetime norms protecting critical civilian systems, before describing the bureaucratic reforms the United States should make to implement effectively these changes." --From publisher description.
None
At a moment when both think tanks and experts are being questioned, significant policy and technology disruptions have called into question the value and efficacy of policy advice. Within that context, Dr. McGann launched this book to examine the future of think tanks and policy advice around the world with a series of authoritative reflections written by the presidents of some of the leading think tanks in the United States. The book explores the challenges think tanks face today in an information rich and highly competitive operating environment that includes: the impact of technology, big data and artificial intelligence, competition from advocacy groups and public relations firms, increased polarization of politics and major changes in how think tanks are funded.
Special Operations Success establishes a new benchmark in military theory in this deeply analytic and innovative work. It answers several pressing questions: How successful have American special operations been over the past quarter-century? Are special forces fated to cycles of expansion and misuse? Will special forces invariably exceed the authorities granted to them because of they are? Is a general theory of special operations feasible given the range of activities and conditions that fall under the category? Kiras' work is based on two decades of practical, teaching, and consulting experience within different special operations communities, and its analysis and conclusions are designed ...
The Aspen Policy Books present innovative thinking on America's most pressing national security challenges. "Securing Cyberspace: A New Domain for National Security" is a collection of papers commissioned for the 2011 Aspen Strategy Group workshop, a bipartisan meeting of top national security experts. The papers examine the complexities of the emerging cyber threat, as well as the possibilities--and inherent challenges--of crafting effective domestic and international cyber policy. Authors explore topics such as the economic impact of cybercrime, cyber as a new dimension of warfare, the revolutionary potential of Internet freedom, and the future realities the United States will face in the new age of heightened Internet connectivity.