Catalogue Search | MBRL
Search Results Heading
Explore the vast range of titles available.
MBRLSearchResults
-
DisciplineDiscipline
-
Is Peer ReviewedIs Peer Reviewed
-
Reading LevelReading Level
-
Content TypeContent Type
-
YearFrom:-To:
-
More FiltersMore FiltersItem TypeIs Full-Text AvailableSubjectPublisherSourceDonorLanguagePlace of PublicationContributorsLocation
Done
Filters
Reset
16
result(s) for
"Libicki, Martin C., author"
Sort by:
Cyberspace in peace and war
\"Cyberspace in Peace and War presents a comprehensive understanding of cybersecurity, cyberwar, and cyber terrorism. From basic concepts to advanced principles, Libicki examines the sources and consequences of system compromises, addresses how cybersecurity policies can strengthen countries defenses--leaving them less susceptible to cyberattack, and explores cybersecurity in the context of military operations, highlighting unique aspects of the digital battleground and strategic uses of cyberwar. He provides the technical and geopolitical foundations of cyberwar necessary to understand the policies, operations, and strategies required for safeguarding an increasingly online infrastructure.\"--Provided by publisher.
Global Demographic Change and Its Implications for Military Power
by
Shatz, Howard J
,
Libicki, Martin C
,
Taylor, Julie E
in
Armed Forces
,
Demographic transition
,
Diagnosis
2011
What is the impact of demographics on the prospective production of military power and the causes of war? This monograph analyzes this issue by projecting working-age populations through 2050; assessing the influence of demographics on manpower, national income and expenditures, and human capital; and examining how changes in these factors may affect the ability of states to carry out military missions.
Crisis and Escalation in Cyberspace
The chances are growing that the United States will find itself in a crisis in cyberspace—the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. Such crises can be managed by taking steps to reduce the incentives for other states to step in, controlling the narrative, understanding the stability parameters of the crises, and recognizing escalation risks.
Markets for Cybercrime Tools and Stolen Data
by
Ablon, Lillian
,
Golay, Andrea A
,
Libicki, Martin C
in
Black market
,
Computer crimes
,
Computer crimes-Economic aspects
2014
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.
Hackers Wanted
by
Senty, David
,
Libicki, Martin C
,
Pollak, Julia
in
Computer crimes
,
Computer hackers
,
Computing and Information Technology
2014
The perceived shortage of cybersecurity professionals working on national security may endanger the nation’s networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years.
The Defender’s Dilemma
by
Ablon, Lillian
,
Libicki, Martin C
,
Webb, Tim
in
Computer networks
,
Computer security
,
Computer viruses, Trojans and worms
2015
Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures—and the countermeasures that attackers create to subvert those measures; and explores the role of software vulnerabilities and inherent weaknesses.
Cyberdeterrence and Cyberwar
2009
Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these differences and ways the United States protect itself in the face of attack.
The U.S.-China Military Scorecard
by
David A. Shlapak
,
Burgess Laird
,
David R. Frelinger
in
Air forces and warfare
,
Armed Forces
,
China
2015
A RAND study analyzed Chinese and U.S. military capabilities in two scenarios (Taiwan and the Spratly Islands) from 1996 to 2017, finding that trends in most, but not all, areas run strongly against the United States. While U.S. aggregate power remains greater than China’s, distance and geography affect outcomes. China is capable of challenging U.S. military dominance on its immediate periphery—and its reach is likely to grow in the years ahead.
Internet Freedom and Political Space
by
Lowell H. Schwartz
,
Olesya Tkacheva
,
Jeffrey Martini
in
Adult education
,
Asian history
,
Continuing education
2013
The Internet is a new battleground between governments that censor online content and those who advocate freedom for all to browse, post, and share information online. This report examines how Internet freedom may transform state-society relations in nondemocratic regimes, using case studies of China, Egypt, Russia, and Syria, and also draws parallels between Internet freedom and Radio Free Europe programs during the Cold War.