Oct 8, 2009
|PDF file||1 MB||Best for desktop computers.|
|ePub file||2.7 MB||Best for mobile devices.
On desktop computers and some mobile devices, you may need to download an eBook reader to view ePub files. Calibre is an example of a free and open source e-book library management application.
|mobi file||0.9 MB||Best for Kindle 1-3.
On desktop computers and some mobile devices, you may need to download an eBook reader to view mobi files. Amazon Kindle is the most popular reader for mobi files.
|PDF file||0.2 MB|
|Add to Cart||Paperback238 pages||$33.00||$26.40 20% Web Discount|
The protection of cyberspace, the information medium, has become a vital national interest because of its importance both to the economy and to military power. An attacker may tamper with networks to steal information for the money or to disrupt operations. Future wars are likely to be carried out, in part or perhaps entirely, in cyberspace. It might therefore seem obvious that maneuvering in cyberspace is like maneuvering in other media, but nothing would be more misleading. Cyberspace has its own laws; for instance, it is easy to hide identities and difficult to predict or even understand battle damage, and attacks deplete themselves quickly. Cyberwar is nothing so much as the manipulation of ambiguity. The author explores these topics in detail and uses the results to address such issues as the pros and cons of counterattack, the value of deterrence and vigilance, and other actions the United States and the U.S. Air Force can take to protect itself in the face of deliberate cyberattack.
A Conceptual Framework
Why Cyberdeterrence Is Different
Why the Purpose of the Original Cyberattack Matters
A Strategy of Response
What Constitutes an Act of War in Cyberspace?
The Calculus of Explicit Versus Implicit Deterrence
The Dim Prospects for Cyber Arms Control