-
Free Shipping on all Orders Over $35!*
*excludes Marketplace items.
List Price: $57.95
Usually Ships in 5-7 Business Days
$57.66
Select for Price
Online:
180 Days access
Downloadable: 180 Days
Downloadable: 180 Days
$42.67
Online:
365 Days access
Downloadable: 365 Days
Downloadable: 365 Days
$50.42
Online:
365 Days access
Downloadable: Lifetime Access
Downloadable: Lifetime Access
$77.57
$42.67
We're Sorry
Sold Out
Summary
As the activities of individuals, organizations, and nations increasingly occur in cyberspace, the security of those activities is becoming a growing concern. Political, economic and military leaders must manage and reduce the level of risk associated with threats from hostile states, malevolent nonstate actors such as organized terrorist groups or individual hackers, and high-tech accidents. The impact of the information technology revolution on warfare, global stability, governance, and even the meaning of existing security constructs like deterrence is significant. These essays examine the ways in which the information technology revolution has affected the logic of deterrence and crisis management, definitions of peace and war, democratic constraints on conflict, the conduct of and military organization for war, and the growing role of the private sector in providing security.
Table of Contents
Introduction: Security in the Information Technology Age | |
Managing Conflict in the Information Age | |
Integrated Security: A strategic response to anonymity and the problem of the few | |
Revolution's End: Information technology and crisis management | |
Organization and Conduct of Warfare in the Information Age | |
Wars of Disruption: International competition and information technology-driven military organizations | |
The Strategy and Tactics of Information Warfare | |
Governance in the Information Age | |
Information Warfare and Democratic Accountability | |
Information Warfare and Domestic Threats to American Security | |
Private Sector Incentives for Managing Security | |
Rewarding IT Security in the Marketplace | |
Concluding Reflections | |
Thinking About New Security Paradigms | |
Table of Contents provided by Publisher. All Rights Reserved. |
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.