Permalien Courriel Export
Actes de colloque
Understanding cyber conflict : 14 analogies
Éditeur Georgetown university press
Année copyright 2017
Notices liées
Notice détaillée
Understanding cyber conflict : 14 analogies
1 vol. (VIII-297 p.) : ill., fig., tabl. ; 26 cm
Textes issus de communications, présentés lors d'un colloque, tenu au "National cryptologie museum" à Fort Meade (Md.)
Notes bibliogr. Index
Classification Dewey
P. 1 ; Introduction / George Perkovich and Ariel E. Levite ; P.17 ; 1 Intelligence in Cyber; and Cyber in Intelligence / Michael Warner ; P. 31 ; 2 Nonlethal Weapons and Cyber Capabilities / Lt. Gen. Robert Schmidle Jr. (USMC, ret.), Michael Sulmeyer, and Ben Buchanan ; P. 45 ; 3 Cyber Weapons and Precision-Guided Munitions / James M. Acton ; P. 61 ; 4 Cyber, Drones, and Secrecy / David E. Sanger ; P. 81 ; 5 Cyber War and Information War à la Russe / Stephen Blank ; P. 99 ; 6 AN Ounce of (Virtual) Prevention ? / John Arquilla ; P. 111 ; 7 Crisis Instability and Preemption: The 1914 Railroad Analogy / Francis J. Gavin ; P. 123 ; 8 Brits-Krieg: The Strategy of Economic Warfare / Nicholas A. Lambert ; P. 147 ; 9 Why a Digital Pearl harbor Makes Sense... and Is Possible / Emily O. Goldman and Michael Warner ; P. 161 ; 10 Cyber Threats, Nuclear Analogies ? Divergent trajectories in Adapting to New Dual-Use Technologies / Steven E. Miller ; P. 181 ; 11 From Pearl Harbor to the "Harbor Lights" / John Arquilla ; P. 193 ; 12 Active Cyber Defense: Applying Air Defense to the Cyber Domain / Dorothy E. Denning and Bradley J. Strawser ; P. 211 ; 13 "When the Urgency of Time and Circumstances Clearly Does Not Permit...": Pre-delegation in Nuclear and Cyber Scenarios / Peter Feaver and Kenneth Geers ; P. 231 ; 14 Cybersecurity and the Age of Privateering / Florian Egloff ; P. 249 ; Conclusions / George Perkovich and Ariel E. Levite
Présentation de l'éditeur : "Analogies help us think, learn, and communicate. The fourteen case studies in this volume help readers make sense of contemporary cyber conflict through historical analogies to past military-technological problems. The chapters are divided into three groups. The first--What Are Cyber Weapons Like ?--examines the characteristics of cyber capabilities and how their use for intelligence gathering, signaling, and precision strike compares with earlier technologies for such missions. The second section--What Might Cyber Wars Be Like ?--explores how lessons from several wars since the early 19th century, including the World Wars, could apply or not apply to cyber conflict in the 21st century. The final section--What Is Preventing and/or Managing Cyber Conflict Like ?--offers lessons from 19th and 20th century cases of managing threatening actors and technologies."
Origine de la notice
Abes (SUDOC)

inMedia v4.4