Browse Items (14 total)

Main Argument: Many articles and reports focus on how cyber attacks have the potential to damage critical infrastructure. The authors of this book argue that cyber attacks can actually be used for security purposes as well. Rather than creating…

Tags: , , ,

The BiblioGov Project is an effort to expand awareness of the public documents and records of the U.S. Government via print publications. In broadening the public understanding of government and its work, an enlightened democracy can grow and…

Main Argument: This collection of articles revolves around the theme of a new realm of information. As this is the “information age,” reasons for engaging in war will change. This book argues that the war may be non-violent. Meaning, war…

Tags:

Main Argument: The nature of war has changed significantly. One does not need to wear a uniform and stand on the front lines anymore. In this Information Age, conflict arises from ideas, identity, values and fears. The authors argue that there has…

Tags:

Main Argument: This book argues that conflict and security have radically changed in the 21st century due to the Cold War, 9/11 and War on Terror. The authors argue that technology is affecting war, as well as people’s conceptions of war. …

Tags:

Main Argument: Guisnel argues that security risks are real and should not be taken lightly. However, he warns that in the name of “security” against terrorists or other adversaries might violate civil liberties and freedom of speech. He…

Tags: ,

Main Argument: The argument of this book is to help educate people on cyber crimes. Branigan includes stories of hacking, viruses, identity theft, etc. in order to understand them. The goal is to inform readers about why and how hackers conduct cyber…

Tags:

Main Argument: This book argues that before engaging into detailed, complicated texts about cyberwar and cyber attacks, one should have a general grasp of what the larger issues are. While the book moves beyond concepts like "hackers" and…

Tags:

Main Argument: The authors identify new hacking techniques and abilities. Essentially, this book provides examples of hacking attacks and helps prepare for any future cyber threat. They emphasize that hackers now use social media sites, mobile…

Tags:

Main Argument: This book addresses the issue of what conquest means in cyberspace because the perimeter of that space is undefined. Libicki argues that warfare in cyberspace is significantly different than in conventional locations (i.e. land, air,…

Tags: