Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
This volume seeks to provide some clarity regarding the history and current capabilities of the cyber domain. Its authors have largely, though not exclusively, focused upon the Western experience, particularly the United States.
Choose an application
Military robots are already being used in conflicts around the globe and are affecting both the decision to go to war and the means by which wars are conducted. This book covers the history of military robotics, analyzes their current employment, and examines the ramifications of their future utilization.
Choose an application
"This current volume seeks to provide some clarity regarding the history and current capabilities of the cyber domain. Its authors have largely, though not exclusively, focused upon the Western experience, particularly the United States. In part, this is due to the availability of open source, unclassified data. Not only are the sources more readily available, but they tend to be more applicable to the target audience for this work. The authors come from a wide variety of backgrounds, with a substantial number of them serving in the military or other governmental institutions. As such, it needs to be stated that the ideas and arguments presented in this volume are the opinions of the individual authors, based upon their expertise, and do not represent the position of any government, military entity, or institution."--Provided by publisher.
Cyberspace operations (Military science) --- Cyberterrorism --- Attacks on computers --- Computer attacks --- Cyber attacks --- Cyber terrorism --- Cyber war --- Cyberwarfare --- Electronic terrorism (Cyberterrorism) --- Computer crimes --- Terrorism --- Cyber war (Military science) --- Cyberwar (Military science) --- Cyberspace warfare (Military science) --- Cyberwarfare (Military science) --- Offensive cyber operations (Military science) --- Military art and science
Choose an application
This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat.
Cyberspace -- Security measures -- History. --- Cyberspace operations (Military science). --- Cyberterrorism -- Prevention. --- Cyberterrorism. --- Cyberspace operations (Military science) --- Cyberspace --- Cyberterrorism --- Computer crimes --- History --- Security measures --- Prevention --- History. --- Prevention.
Choose an application
Military robots are affecting both the decision to go to war and the means by which wars are conducted. This book covers the history of military robotics, analyzes their current employment, and examines the ramifications of their future utilization. Robotic systems are the future of military conflicts: their development is already revolutionizing the nature of human conflict-and eroding the standards of acceptable behavior in wartime. Written by a professor who teaches strategy and leadership for the U.S. Air Force, one of the global leaders in the development and utilization of military robots, this book both addresses the history of military robotics and discusses the troubling future ramifications of this game-changing technology. Organized both chronologically and thematically, the book's chapters describe the development and evolution of unmanned warfare; clarify the past, current, and future capabilities of military robotics; and offer a detailed and convincing argument that limits should be placed upon their development before it is too late. This standout work presents an eye-opening analysis that military personnel, civil servants, and academic instructors who teach military history, social policy, and ethics can ill afford to ignore, and will also provide the general public with information that will correct misconceptions about military robotics derived through popular culture and the news media.
Choose an application
Offering comprehensive coverage for those examining Civil War propaganda, this volume provides a broad analysis of efforts by both Union and Confederate sides to influence public opinion of America's deadliest conflict. This illuminating reference work contains excerpts from roughly 100 individual pieces of propaganda generated during the American Civil War in the North and the South, as well as contextual analysis to assist readers in understanding its utility, importance, and effect. It includes written arguments, staged photographs, and political cartoons, all of which were used to advance one side's objectives while undermining the enemy's. This helps readers to understand the underlying arguments of each side as well as the willingness of each to distort the truth for political, military, or economic advantage. This book is organized chronologically, allowing readers to understand how propaganda developed and expanded throughout the war. It includes a chapter dedicated to each of the war years (1861-1865), an antebellum chapter, and a postwar chapter. Each document comprised in the volume includes an analysis of the significance and effectiveness of the piece and guides readers to examine it with a critical eye. The original source documents remain in their original verbiage, including common spelling errors and other interesting aspects of 19th-century communication.
History --- United States --- Propaganda --- Public opinion
Choose an application
This meticulously curated primary source collection is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019. Each document is accompanied by an introduction and analysis written by an expert in the field that provides the necessary context for readers to learn about the complexities of cyber warfare.The title's nearly 100 documents are drawn primarily but not exclusively from government sources and allow readers to understand how policy, strategy, doctrine, and tactics of cyber warfare are created and devised, particularly in the United States. Although the U.S. is the global leader in cyber capabilities and is largely driving the determination of norms within the cyber domain, the title additionally contains a small number of international documents. This invaluable work will serve as an excellent starting point for anyone seeking to understand the nature and character of international cyber warfare.
Cyberspace operations (Military science) --- Cyberspace --- Information warfare --- Government policy
Choose an application
Cyberwarfare, a term that encompasses a wide range of computer-based attacks on targeted enemy states, has emerged as one of the most pressing national security concerns of the 21st century. All around the world, the scramble to shield thoroughly computerized military and infrastructure resources from cyber attacks is intensifying. Military experts, for example, believe that Ukraine's ability to defend its cyberspace from Russian cyber attacks was one of the key reasons Russia's dramatic 2022 invasion of neighboring Ukraine failed to topple the Ukrainian government in Kiev. This all-in-one resource explains the world of cyber warfare in authoritative but lay friendly terms. First, it details the historical evolution of cyber warfare and the different forms it can take, from crippling attacks on power grids and communications networks to secret intelligence gathering. From there it moves into a wide-ranging exploration of the main controversies and issues surrounding cyber security and cyber warfare, as well as coverage of major cyber warfare attacks, the organizations responsible, and the steps that the United States and other countries are taking to protect themselves from this constantly evolving threat. Like all books in the Contemporary World Issues series, this volume features a suite of "Perspectives" in which cyber warfare experts provide insights on various elements of cyber warfare. Other features include informative primary documents, data tables, chronology, and a glossary of terms.
Computer crimes --- Cyberterrorism --- Cyberspace --- Cyberspace operations (Military science) --- Prevention. --- Security measures --- History. --- Prevention --- Security measures&delete& --- History
Choose an application
"This ground-breaking work explores the lives of average soldiers from the American Revolution through the 21st-century conflicts in Afghanistan and Iraq"--
Soldiers --- History. --- United States --- History, Military. --- Armed Forces --- Military life. --- Military life
Choose an application
Air Force spouses --- Social role --- Leadership --- Families of military personnel --- United States. --- Military life.
Listing 1 - 10 of 11 | << page >> |
Sort by
|