Narrow your search

Library

ULiège (5)

KU Leuven (4)

LUCA School of Arts (1)

NATO Library (1)

Odisee (1)

Thomas More Kempen (1)

Thomas More Mechelen (1)

UCLL (1)

VDIC (1)

VIVES (1)

More...

Resource type

book (9)


Language

English (9)


Year
From To Submit

2024 (1)

2021 (1)

2020 (1)

2019 (1)

2015 (3)

More...
Listing 1 - 9 of 9
Sort by

Book
Information technology and military power
Author:
ISBN: 1501749587 Year: 2021 Publisher: Ithaca : Cornell University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Militaries with state-of-the-art information technology sometimes bog down in confusing conflicts. To understand why, it is important to understand the micro-foundations of military power in the information age, and this is exactly what this book gives us. As the text shows, digital systems now mediate almost every effort to gather, store, display, analyze, and communicate information in military organizations. The book highlights how personnel now struggle with their own information systems as much as with the enemy.


Book
Information technology and military power
Author:
ISBN: 9781501749582 9781501749575 1501749579 1501749587 9781501749568 1501749560 Year: 2020 Publisher: Ithaca

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
Cross-domain deterrence : strategy in an era of complexity
Authors: ---
ISBN: 0190909609 0190908661 019090867X Year: 2019 Publisher: New York, NY : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The complexity of the 21st century threat landscape contrasts significantly with the bilateral nuclear bargaining context envisioned by classical deterrence theory. Nuclear & conventional arsenals continue to develop alongside antisatellite programs, autonomous robotics or drones, cyber operations, biotechnology, & other innovations barely imagined in the early nuclear age. The concept of cross-domain deterrence emerged near the end of the George W. Bush administration as policymakers & commanders confronted emerging threats to vital American military systems in space & cyberspace. The Pentagon now recognizes five operational environments or so-called domains (land, sea, air, space, & cyberspace), & cross-domain deterrence poses serious problems in practice. This text steps back to assess the theoretical relevance of cross-domain deterrence for the field of international relations.


Book
Elements of deterrence : strategy, technology, and complexity in global politics
Authors: ---
ISBN: 0197754481 0197754465 Year: 2024 Publisher: New York, NY : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Global politics in the twenty-first century is complicated by dense economic interdependence, rapid technological innovation, and fierce security competition. How should governments formulate grand strategy in this complex environment? Many strategists look to deterrence as the answer, but how much can we expect of deterrence? Classical deterrence theory developed in response to the nuclear threats of the Cold War, but strategists since have applied it to a variety of threats in the land, sea, air, space, and cyber domains.


Book
China and Cybersecurity : Espionage, Strategy and Politics in the Digital Domain
Authors: ---
ISBN: 9780190201272 Year: 2015 Publisher: Oxford University Press

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
China and Cybersecurity: Espionage, Strategy, and Politics in the Digital Domain
Authors: --- ---
ISBN: 9780190201265 Year: 2015

Loading...
Export citation

Choose an application

Bookmark

Abstract

China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of 'informatization' reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber attacks - predominantly from the United States. This book is a comprehensive analysis of China's cyberspace threats and policies. The contributors - Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West - address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.


Book
China and cybersecurity : espionage, strategy, and politics in the digital domain
Authors: --- --- ---
ISBN: 9780190201289 0190201282 9780190201302 0190201304 Year: 2015 Publisher: New York : Oxford University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This volume contributes substantively to our understanding of China and cybersecurity, both complex topics on their own, by exploring how China's domestic political and economic system shapes its cyber activities. The collaboration also stands as an example of how Chinese and Western experts can work together to improve trust and understanding in an area of great mutual concern.


Book
Varieties of insurgency and counterinsurgency in Iraq, 2003-2009
Authors: --- ---
Year: 2012 Publisher: Newport, RI : Center on Irregular Warfare & Armed Groups (CIWAG), U.S. Naval War College,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Varieties of insurgency and counterinsurgency in Iraq, 2003-2009
Authors: --- ---
Year: 2012 Publisher: Newport, RI : Center on Irregular Warfare & Armed Groups (CIWAG), U.S. Naval War College,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Listing 1 - 9 of 9
Sort by