Product details:
ISBN13: | 9780521871600 |
ISBN10: | 0521871603 |
Binding: | Hardback |
No. of pages: | 336 pages |
Size: | 236x160x24 mm |
Weight: | 570 g |
Language: | English |
0 |
Category:
Computer networks in general
Privacy, data security
Computer crime
Computer viruses
Safety and health aspects of computing
Criminology
Politics in general, handbooks
International relations
Further readings in politics
Military theory
Computer networks in general (charity campaign)
Privacy, data security (charity campaign)
Computer crime (charity campaign)
Computer viruses (charity campaign)
Safety and health aspects of computing (charity campaign)
Criminology (charity campaign)
Politics in general, handbooks (charity campaign)
International relations (charity campaign)
Further readings in politics (charity campaign)
Military theory (charity campaign)
Conquest in Cyberspace
National Security and Information Warfare
Publisher: Cambridge University Press
Date of Publication: 21 May 2007
Normal price:
Publisher's listprice:
GBP 54.00
GBP 54.00
Your price:
22 090 (21 038 HUF + 5% VAT )
discount is: 20% (approx 5 522 HUF off)
Discount is valid until: 31 December 2024
The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
Click here to subscribe.
Click here to subscribe.
Availability:
Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
Not in stock at Prospero.
Can't you provide more accurate information?
Not in stock at Prospero.
Short description:
This book shows the risks and protections cyberspace offers for national security and information warfare.
Long description:
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The author also investigates how far 'friendly conquest' in cyberspace extends, such as the power to persuade users to adopt new points of view. He discusses the role of public policy in managing cyberspace conquests and shows how the Internet is becoming more ubiquitous and complex, such as in the use of artificial intelligence.
"Libicki recognizes the grand problem in discourse on the topic of cyberwarfare: the incredible breadth of topical space....Conquest in Cyberspace is an admirable work. It covers much territory and serves the important role of provoking thought and redirecting inquiry. By crossing disciplinary boundaries, Martin Libicki has enriched our understanding of the relationship between information technology and international politics."
Chris Bronk, Journal of Information Technology & Politics
"Libicki recognizes the grand problem in discourse on the topic of cyberwarfare: the incredible breadth of topical space....Conquest in Cyberspace is an admirable work. It covers much territory and serves the important role of provoking thought and redirecting inquiry. By crossing disciplinary boundaries, Martin Libicki has enriched our understanding of the relationship between information technology and international politics."
Chris Bronk, Journal of Information Technology & Politics
Table of Contents:
1. Introduction; 2. Hostile conquest as information warfare; 3. Information warfare as noise; 4. Information warfare against defense systems; 5. Information warfare against command and control; 6. Friendly conquest in cyberspace; 7. Friendly conquest using global systems; 8. Retail conquest in cyberspace; 9. From intimacy, vulnerability; 10. Talking conquest in cyberspace; 11. Managing conquest in cyberspace; Appendix. Why cyberspace is likely to gain consequence.