Cyberpower and National Security

Paperback (Print)
Rent
Rent from BN.com
$10.89
(Save 73%)
Est. Return Date: 09/22/2014
Buy Used
Buy Used from BN.com
$23.50
(Save 41%)
Item is in good condition but packaging may have signs of shelf wear/aging or torn packaging.
Condition: Used – Good details
Used and New from Other Sellers
Used and New from Other Sellers
from $17.73
Usually ships in 1-2 business days
(Save 55%)
Other sellers (Paperback)
  • All (28) from $17.73   
  • New (13) from $24.29   
  • Used (15) from $17.73   

Overview

The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas.

The first section provides a broad foundation and overview of the subject by identifying key policy issues, establishing a common vocabulary, and proposing an initial version of a theory of cyberpower. The second section identifies and explores possible changes in cyberspace over the next fifteen years by assessing cyber infrastructure and security challenges. The third section analyzes the potential impact of changes in cyberspace on the military and informational levers of power. The fourth section addresses the extent to which changes in cyberspace serve to empower key entities such as transnational criminals, terrorists, and nation-states. The final section examines key institutional factors, which include issues concerning governance, legal dimensions, critical infrastructure protection, and organization.

Cyberpower and National Security frames the key issues concerned and identifies the important questions involved in building the human capacity to address cyber issues, balancing civil liberties with national security considerations, and developing the international partnerships needed to address cyber challenges. With more than two dozen contributors, Cyberpower and National Security covers it all.

Read More Show Less

Editorial Reviews

From the Publisher
“Experts in the field of ‘cyberpower’ address a range of issues arising from the use of cyberspace by malevolent actors and ‘the many security vulnerabilities that plague this sphere.’ Both the theory and practical application of cyberpower are discussed.”

"Cyberpower security is now one of the major national security problems facing the United States. This book recognizes and emphasizes the need for the government to develop a holistic approach to cyberpower; without this awareness and commitment, our national security is in jeopardy."

"It's about time! After nearly 20 years, finally, a well-thought-out, analytical compendium of the current state of the art. The challenge is implementing these ideas in a meaningful manner that provides true cybernational security against a world of asymmetric actors. This is going to be one of my primary references for years to come."

"National Defense University [NDU] is the trailblazer in thinking about cyberpower. This book and the workshops NDU convened while it was drafted provide some of the absolutely best thinking around on how cyber is reshaping the exercise of power and what that will mean for American security."

"This book not only offers an inside look at military cyberpower, tactics, and strategies, but also gives a unique look at cyber deterrence, cyber law, and opportunities for future research. In today's cyber environment, the United States must work diligently to not only keep up with our near-peer competitors, but to stay one step ahead of them. Cyberpower and National Security explores policy issues, theories, trends, and future technologies that can give the United States that edge in the cyber domain"

Read More Show Less

Product Details

  • ISBN-13: 9781597974233
  • Publisher: Potomac Books Inc.
  • Publication date: 4/30/2009
  • Edition description: New Edition
  • Pages: 664
  • Sales rank: 469,193
  • Product dimensions: 6.00 (w) x 8.90 (h) x 1.60 (d)

Meet the Author

Franklin D. Kramer is a distinguished research fellow in the Center for Technology and National Security Policy at the National Defense University. He served as the assistant secretary of defense for international security affairs from 1996 to 2001.

Stuart H. Starr is also a distinguished research fellow in the Center for Technology and National Security Policy at the National Defense University. He concurrently serves as the president of the Barcroft Research Institute.

Larry Wentz is a senior research fellow in the Center for Technology and National Security Policy at the National Defense University.

Read More Show Less

Table of Contents

List of Illustrations ix

Preface xiii

Introduction xv

Part I Foundation and Overview

1 Cyberpower and National Security: Policy Recommendations for a Strategic Framework Franklin D. Kramer 3

2 From Cyberspace to Cyberpower: Defining the Problem Daniel T. Kuehl 24

3 Toward a Preliminary Theory of Cyberpower Stuart H. Starr 43

Part II Cyberspace

4 A Graphical Introduction to the Structural Elements of Cyberspace Elihu Zimet Edward Skoudis 91

5 Cyberspace and Infrastructure William D. O'Neil 113

6 Evolutionary Trends in Cyberspace Edward Skoudis 147

7 Information Security Issues in Cyberspace Edward Skoudis 171

8 The Future of the Internet and Cyberpower Marjory S. Blumenthal David D. Clark 206

9 Information Technology and the Biotech Revolution Edward Skoudis 241

Part III Cyberpower: Military Use and Deterrence

10 An Environmental Approach to Understanding Cyberpower Gregory J. Rattray 253

11 Military Cyberpower Martin C. Libicki 275

12 Military Service Overview Elihu Zimet Charles L. Barry 285

13 Deterrence of Cyber Attacks Richard L. Kugler 309

Part IV Cyberpower: Information

14 Cyber Influence and International Security Franklin D. Kramer Larry K. Wentz 343

15 Tactical Influence Operations Stuart H. Starr 362

16 I-Power: The Information Revolution and Stability Operations Franklin D. Kramer Larry K. Wentz Stuart H. Starr 373

17 Facilitating Stability Operations with Cyberpower Gerard J. Christman 392

Part V Cyberpower: Strategic Problems

18 Cyber Crime Clay Wilson 415

19 Cyber Terrorism: Menace or Myth? Irving Lachow 437

20 Nation-state Cyber Strategies: Examples from China and Russia Timothy L. Thomas465

Part VI Institutional Factors

21 Internet Governance Harold Kwalwasser 491

22 International Law and Information Operations Thomas C. Wingfield 525

23 Cyberpower and Critical Infrastructure Protection: A Critical Assessment of Federal Efforts John A. McCarthy Chris Burrow Maeve Dion Olivia Pacheco 543

24 Cyberpower from the Presidential Perspective Leon Fuerth 557

Notes 563

About the Contributors 623

Index 627

Read More Show Less

Customer Reviews

Average Rating 4
( 2 )
Rating Distribution

5 Star

(1)

4 Star

(0)

3 Star

(1)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing all of 2 Customer Reviews
  • Anonymous

    Posted September 7, 2013

    Numerous authors in the field of computer technology, protocols,

    Numerous authors in the field of computer technology, protocols, and cybersecurity have contributed to this book. Cyberpower and national security are presented as interlinked. The book begins by discussing cybersecurity policy recommendations, defines the problem of cyberspace to cyberpower, and offers a theory of what constitutes cyberpower. Part II discusses the elements that comprise "cyberspace" - the hardware, architecture, trends of Internet users, arising security issues, the trending issues & the future, and the biotec revolution. Part III discusses why "cyberspace" is an environment, how the military uses cyberpower, and what is the best deterrent against cyber attacks. Part IV discusses information as an asset, the information revolution, how its protection is important and cyber power can enforce security of it. Part V discusses cyber crime cases, how terrorism plays a role in cyber crime, and how "nation-states" like China systematically and intentionally have organized ranks of hackers to steal technology secrets and use them for profit. Part VI discusses the difficulty governing the Internet, International laws, U.S. government efforts to protect our critical infrastructure, and the Presidential Perspective on cyberpower.

    This is another textbook that is following the trend in the militarization of the Internet. I dislike the term, "cyberspace" as a "place" that has been characterized as a battle zone. The military's stance on cybersecurity is naturally oriented to more than just defense since it has been proven (in the pudding) insufficient time and time again. The notion that a strong defense is the best offense is being abandoned and an offensive stance is now considered to be the only option to prevent future intrusions. This book lays out the playing field and calls for governance and rules. Still, the fact that the entire U.S. government switched over to Microsoft's proprietary (and therefore unknown and hidden) operating system (for better interoperability) versus open source and customizable Unix or Linux is one of the constants that arises when examining the huge increase in cyber intrusion by foreign entities & governments. If you live in Moldova you can participate in software piracy without consequence. You can also reverse engineer a Microsoft operating system and exploit (zero-day) any vulnerabilities you may find. Your network of other hackers will know almost immediately yet it will take Microsoft weeks to months to years to write code for "patches" to fix the vulnerability. With open source, anyone can test for vulnerabilities and the "fix" turnaround time is so fast. The custom in-house operating system also protects government agencies from intrusion since hackers cannot reverse engineer it since they don't have a copy. I think there is an absolute solution. Return to the time when a computer was an essential part of doing business. I will venture that a big part of the reason why companies are outsourcing jobs & the recession is due to the extra costs of computerization, privacy protection, digital forensic experts, cybersecurity advisors etc. Added to that is the cost of actual war. There is no such thing as Internet security - there is only the illusion of it. Anyone with an Internet interfact or even a USB drive is vulnerable to malware, exposure of trade secrets, and sabotage including our electrical grid, our nuclear power plants, our water filtration plants etc. This book just add to the fear mongering so that the Internet will be viewed as the new target for the military in a never ending war not on land, sea, or air, but in the nether regions of cables, personal PCs, servers, and networks.

    I think in recent months the public has become more aware of the extent to which the U.S. government has gone to "protect" our infrastructure from government spying on & collecting data for mining purposes on all U.S. citizens to the Stuxnet Iranian debacle. Clearly, the government is on the offense and is using the Internet as a weapon.

    Was this review helpful? Yes  No   Report this review
  • Anonymous

    Posted March 17, 2010

    No text was provided for this review.

Sort by: Showing all of 2 Customer Reviews

If you find inappropriate content, please report it to Barnes & Noble
Why is this product inappropriate?
Comments (optional)