Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
16 result(s) for "Libicki, Martin C., author"
Sort by:
Cyberspace in peace and war
\"Cyberspace in Peace and War presents a comprehensive understanding of cybersecurity, cyberwar, and cyber terrorism. From basic concepts to advanced principles, Libicki examines the sources and consequences of system compromises, addresses how cybersecurity policies can strengthen countries defenses--leaving them less susceptible to cyberattack, and explores cybersecurity in the context of military operations, highlighting unique aspects of the digital battleground and strategic uses of cyberwar. He provides the technical and geopolitical foundations of cyberwar necessary to understand the policies, operations, and strategies required for safeguarding an increasingly online infrastructure.\"--Provided by publisher.
Global Demographic Change and Its Implications for Military Power
What is the impact of demographics on the prospective production of military power and the causes of war? This monograph analyzes this issue by projecting working-age populations through 2050; assessing the influence of demographics on manpower, national income and expenditures, and human capital; and examining how changes in these factors may affect the ability of states to carry out military missions.
Crisis and Escalation in Cyberspace
The chances are growing that the United States will find itself in a crisis in cyberspace—the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. Such crises can be managed by taking steps to reduce the incentives for other states to step in, controlling the narrative, understanding the stability parameters of the crises, and recognizing escalation risks.
Markets for Cybercrime Tools and Stolen Data
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.
Hackers Wanted
The perceived shortage of cybersecurity professionals working on national security may endanger the nation’s networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years.
The Defender’s Dilemma
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures—and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.
Cyberdeterrence and Cyberwar
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
The U.S.-China Military Scorecard
A RAND study analyzed Chinese and U.S. military capabilities in two scenarios (Taiwan and the Spratly Islands) from 1996 to 2017, finding that trends in most, but not all, areas run strongly against the United States. While U.S. aggregate power remains greater than China’s, distance and geography affect outcomes. China is capable of challenging U.S. military dominance on its immediate periphery—and its reach is likely to grow in the years ahead.
Internet Freedom and Political Space
The Internet is a new battleground between governments that censor online content and those who advocate freedom for all to browse, post, and share information online. This report examines how Internet freedom may transform state-society relations in nondemocratic regimes, using case studies of China, Egypt, Russia, and Syria, and also draws parallels between Internet freedom and Radio Free Europe programs during the Cold War.