Catalog Search Results
Author
Description
"In The Next World War, James Adams shows how a new chapter in military history is being written as the Information Age comes to the battlefield: to bigger and stronger, now add smarter." "But the most sugnificant and important use of information warfare won't be on the battlefield. The most devastating weapons will be those that target an enemy's infrastructure - air-control systems, electrical grids, and communication networks, to name just a few...
Description
"This book reviews problems, issues, and presentations of the newest research in the field of cyberwarfare and cyberterrorism. While enormous efficiencies have been gained as a result of computers and telecommunications technologies, use of these systems and networks translates into a major concentration of information resources, creating a vulnerability to a host of attacks and exploitations"--Provided by publisher.
Author
Description
This book introduces policy, government, and security professionals to the concept of "information warfare," covering its evolution over the last decade and its developments among such economic and political giants as China, Russia, Japan, India, and Singapore. The text describes various conceptions of information warfare, along with how they function in military, diplomatic, political, and economic contexts. Recent notable cyber attacks are analyzed,...
Author
Description
"Andreas Krieg examines how state and nonstate actors weaponize narratives in the information space to subvert a target audience or government. One of the most important contributions of the work is his argument that these subversive information operations can achieve strategic, not just tactical effects, through a six-stage process. Subversive information operations rely on networks consisting of a range of virtual, human, and organizational surrogates...
Author
Description
"In light of increased attacks since 2002, Global Information Warfare: The New Digital Battlefield, Second Edition provides a critical update on the nature and approaches to global information warfare. It focuses on threats, vulnerabilities, attacks, and defenses from the perspectives of various players such as governments, corporations, terrorists, and private citizens. Upgrades to the Second Edition include: revised discussions of changes and impacts...
7) Cyber War
Description
It has been described as the Hiroshima of cyber war, the moment where the fevered imaginations of science fiction finally came true. A computer worm called Stuxnet disrupted what the west claimed to be Iran's top-secret plans to build a nuclear bomb. Ben Hammersley travels to LA, Berlin and London to find out what impact Stuxnet has had on the future of warfare.
Author
Description
"Clint Watts electrified the nation when he testified in front of the Senate Select Committee on Intelligence regarding Russian interference in the 2016 election. In Messing with the Enemy, the counterterrorism, cybersecurity, and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don't hack your computer, they hack your mind. Watts reveals how these malefactors use your social media information and...
Author
Description
Security expert Richard A. Clarke goes beyond "geek talk" to succinctly explain how cyber weapons work and how vulnerable America is to the new world of nearly untraceable cyber criminals and spies. This sobering story of technology, government, and military strategy involving criminals, spies, soldiers, and hackers begins the much needed public policy debate about what America's doctrine and strategy should be, not just for waging, but for preventing...
Description
"This book examines the shape, sources and dangers of information warfare (IW) as it pertains to military, diplomatic and civilian stakeholders. Cyber warfare and information warfare are different beasts. Both concern information, but where the former does so exclusively in its digitized and operationalized form, the latter does so in a much broader sense: with IW, information itself is the weapon. The present work aims to help scholars, analysts,...
Description
"In Beyond Convergence: World Without Order, edited by Hilary Matfess and Michael Miklaucic (published 2016), a range of different authors - amongst them several staff members and experts from the Global Initiative against Transnational Organized Crime - examine different areas where a range of illicit actors (international terrorists, globally networked insurgents, and transnational criminal organisations) exploit, thrive on and keep fragile states."--Provided...
Author
Description
"This revelatory and dramatic history of disinformation traces the rise of secret organized deception operations from the interwar period to contemporary internet troll farms"--
We live in the age of disinformation. More than four months before the 2016 election, Rid warned that Russian military intelligence was attempting to disrupt the democratic process. Here he tells the story of modern disinformation, beginning with the post-Russian Revolution...
16) Information wars: how we lost the global battle against disinformation & what we can do about it
Author
Description
"In February of 2013, Richard Stengel, the former editor-in-chief of Time, joined the Obama administration as Under Secretary of State for Public Diplomacy and Public Affairs. Within days, two shocking events made world-wide headlines: ISIS executed American journalist James Foley on a graphic video seen by tens of millions, and Vladimir Putin's 'little green men'--Russian special forces--invaded Crimea, amid a blizzard of Russian denials and false...
In ILL
Didn't find what you need? Items not owned by San Antonio College Library can be requested from other ILL libraries to be delivered to your local library for pickup.
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request