|
Law, policy and technology
|
Eduardo Gelbstein,Pauline C. Reich |
"This book provides relevant frameworks and best practices as well as current empirical research findings for professionals who want to improve their understanding of the impact of cyber-attacks on c… |
OL16499595W |
|
Bordieuan field theory as an instrument for military operational analysis
|
Håkan Gunneriusson |
This book is open access under a CC BY 4.0 license.
This book uses Pierre Bourdieu’s field theory as a lens through which to examine military operations. Novel in its approach, this innovative tex… |
OL17854471W |
|
Network of deception
|
Spencer E. Moses |
"A globe-trotting glimpse into the hidden dimensions of international espionage when a former CIA agent gets caught up in a Mossad mission to defend the nation of Israel"-- |
OL17868180W |
|
Understanding commanders' information needs for influence operations
|
Eric V. Larson |
Documents a study whose goals were to develop an understanding of commanders' information requirements for cultural and other "soft" factors in order to improve the effectiveness of combined arms ope… |
OL18640188W |
|
The next world war
|
James Adams |
Pointing to the obvious irony that traditional warfare is a dying business, the author examines the new methods by which war will be waged in the future. Based on massive Pentagon spending, he foreca… |
OL1889901W |
|
Cyberwar
|
Francha Roffe Menhard |
Describes what a cyberwar might be like, who the enemy might be, and how the U.S. might respond. |
OL19923507W |
|
Aliens
|
Chris Roberson |
xxxix, 363 pages : 24 cm |
OL20006600W |
|
Putin's propaganda machine
|
Marcel H. van Herpen |
"This book examines Russia's 'information war,' one of the most striking features of its intervention in Ukraine. Marcel H. Van Herpen argues that the Kremlin's propaganda offensive is a carefully pr… |
OL20010116W |
|
Rise of the machines
|
Thomas Rid |
"Springing from the febrile mind of mathematician Norbert Wiener amid the devastation of World War II, the cybernetic vision underpinned a host of seductive myths about the future of machines. This v… |
OL20032976W |
|
Ethics and cyber warfare
|
George R. Lucas |
"From North Kore's recent attacks on Sony to perpetual news reports of successful hackings and criminal theft, cyber conflict has emerged as a major topic of public concern. Yet even as attacks on mi… |
OL20046290W |
|
Battle-wise
|
Justin Perkins,David C. Gompert,Irving Lachow |
xvii, 174 pages : 24 cm |
OL23990116W |
|
Conquest in Cyberspace
|
Martin C. Libicki |
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyb… |
OL2664229W |
|
Knowledge reuse and agile processes
|
Amit Mitra |
"This book addresses flexibility of both business and information systems through component technology at the nexus of three seemingly unrelated disciplines: service-oriented architecture, knowledge … |
OL4425003W |
|
Managerial guide for handling cyber-terrorism and information warfare
|
Lech Janczewski |
"This book presents IT managers with what cyberterrorism and information warfare is and how to handle the problems associated with them"--Provided by publisher. |
OL5719060W |
|
Information warfare
|
Michael Erbschloe |
In today's electronic age, the threat of cyberattacks is great. For any organization with information-based assets, the deadliest weapons can come in the form of a keyboard, mouse, or personal comput… |
OL5758669W |
|
Wars of ideas and the war of ideas
|
Antulio Joseph Echevarria |
The author discusses several types of wars of ideas in an effort to achieve a better understanding of what wars of ideas are. That knowledge, in turn, can help inform strategy. It is important to not… |
OL6235873W |