Lyt når som helst, hvor som helst

Nyd den ubegrænsede adgang til tusindvis af spændende e- og lydbøger - helt gratis

  • Lyt og læs så meget du har lyst til
  • Opdag et kæmpe bibliotek fyldt med fortællinger
  • Eksklusive titler + Mofibo Originals
  • Opsig når som helst
Start tilbuddet
DK - Details page - Device banner - 894x1036

No Shortcuts: Why States Struggle to Develop a Military Cyber-Force

Sprog
Engelsk
Format
Kategori

Fakta

Over the past decade, numerous states have declared cyberspace as a new domain of warfare, sought to develop a military cyber strategy and establish a cyber command. These developments have led to much policy talk and concern about the future of warfare as well as the digital vulnerability of society. No Shortcuts provides a level-headed view of where we are in the militarization of cyberspace.In this book, Max Smeets bridges the divide between technology and policy to assess the necessary building blocks for states to develop a military cyber capacity. Smeets argues that for many states, the barriers to entry into conflict in cyberspace are currently too high. Accompanied by a wide range of empirical examples, Smeets shows why governments abilities to develop military cyber capabilities might change over time and explains the limits of capability transfer by states and private actors.

© 2022 Hurst Publishers (E-bog): 9781787388710

Release date

E-bog: 2. juni 2022

Andre kan også lide...

  1. Cybersecurity and Cyberwar: What Everyone Needs to Know Allan Friedman
  2. Cyberdeterrence and Cyberwar Martin C. Libicki
  3. The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics Ben Buchanan
  4. The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Cliff Stoll
  5. Ransom War: How Cyber Crime Became a Threat to National Security Max Smeets
  6. To Catch a Spy: The Art of Counterintelligence James M. Olson
  7. Spies, Lies, and Algorithms: The History and Future of American Intelligence Amy B. Zegart
  8. The Wires of War: Technology and the Global Struggle for Power Jacob Helberg
  9. The New Rules of War: Victory in the Age of Durable Disorder Sean McFate
  10. The Future of Violence: Robots and Germs, Hackers and Drones—Confronting a New Age of Threat Benjamin Wittes
  11. If It's Smart, It's Vulnerable Mikko Hypponen
  12. Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News Clint Watts
  13. We Have Root: Even More Advice from Schneier on Security Bruce Schneier
  14. Russians Among Us: Sleeper Cells, Ghost Stories, and the Hunt for Putin’s Spies Gordon Corera
  15. Cybersecurity For Dummies Joseph Steinberg
  16. Social Engineering: The Art of Human Hacking Christopher Hadnagy
  17. Russian Cyber Warfare: The History of Russia's State-Sponsored Attacks Across the World Charles River Editors
  18. Hackable: How to Do Application Security Right Ted Harrington
  19. Spies, Lies, and Algorithms: The History and Future of American Intelligence Amy B. Zegart
  20. Inside Cyber Warfare: Mapping the Cyber Underworld (3rd Edition) Jeffrey Caruso
  21. The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Perry Carpenter
  22. Unmasking the Social Engineer: The Human Element of Security Paul Ekman
  23. Israel and the Cyber Threat: How the Startup Nation Became a Global Cyber Power Matthew S. Cohen
  24. Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Eric Cole
  25. Why We're Polarized Ezra Klein
  26. The Pentester BluePrint: Starting a Career as an Ethical Hacker Phillip L. Wylie
  27. Cybersecutity First Principles Rick Howard
  28. Project Zero Trust: A Story about a Strategy for Aligning Security and the Business George Finney
  29. People Hacker Jenny Radcliffe
  30. A Leader’s Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Jack J. Domet
  31. Cybersecurity, Cryptography And Network Security For Beginners: Learn Fast How To Get A Job In Cybersecurity HUGO HOFFMAN
  32. Cybercrime Investigators Handbook Graeme Edwards
  33. Cryptography: The Key to Digital Security, How It Works, and Why It Matters Keith Martin
  34. Nation-State Cyber Offensive Capabilities: an in-depth look into a multipolar dimension Eduardo Izycki
  35. The Moral Landscape: How Science Can Determine Human Values Sam Harris
  36. The Cybersecurity Playbook: How Every Leader and Employee Can Contribute to a Culture of Security Allison Cerra
  37. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Gabriella Coleman
  38. Cybersecurity Program Development for Business: The Essential Planning Guide Chris Moschovitis
  39. Ultimate Cyberwarfare for Evasive Cyber Tactics Chang Tan
  40. Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Matt Reyes
  41. The Art of Deception: Controlling the Human Element of Security William L. Simon
  42. Cyber Hacking: Wars in Virtual Space Scientific American

Vælg dit abonnement

  • Over 600.000 titler

  • Download og nyd titler offline

  • Eksklusive titler + Mofibo Originals

  • Børnevenligt miljø (Kids Mode)

  • Det er nemt at opsige når som helst

Flex

For dig som vil prøve Mofibo.

89 kr. /måned
  • 1 konto

  • 20 timer/måned

  • Gem op til 100 ubrugte timer

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Prøv gratis
Den mest populære

Premium

For dig som lytter og læser ofte.

129 kr. /måned
  • 1 konto

  • 100 timer/måned

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Unlimited

For dig som lytter og læser ubegrænset.

149 kr. /måned
  • 1 konto

  • Ubegrænset adgang

  • Eksklusivt indhold hver uge

  • Fri lytning til podcasts

  • Ingen binding

Start tilbuddet

Family

For dig som ønsker at dele historier med familien.

Fra 179 kr. /måned
  • 2-6 konti

  • 100 timer/måned pr. konto

  • Fri lytning til podcasts

  • Kun 39 kr. pr. ekstra konto

  • Ingen binding

2 konti

179 kr. /måned
Prøv gratis