Skip to main content
Sign In
Bookshare Nepal: Home
-A +A
  • Language
    • English
    • Nepali
Help

Search Results

Search results: 18
  • Conquest In Cyberspace: National Security And Information Warfare

    Conquest In Cyberspace: National Security And Information Warfare

    by Martin C. Libicki

    Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The author also investigates how f... More

    Language: ENG
    Copyright: 2007
  • Cyberdeterrence and Cyberwar

    Cyberdeterrence and Cyberwar

    by Martin C. Libicki

    Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but th... More

    Language: ENG
    Copyright: 2009
  • Crisis and Escalation in Cyberspace

    Crisis and Escalation in Cyberspace

    by Martin C. Libicki

    The chances are growing that the United States will find itself in a crisis in cyberspace-the escalation of tensions associated with a major cyberattack, suspicions that one has taken place, or fears that it might do so soon. Such crises can be managed by taking steps to reduce the incentives for o... More

    Language: ENG
    Copyright: 2012
  • Brandishing Cyberattack Capabilities

    Brandishing Cyberattack Capabilities

    by Martin C. Libicki

    Deterrence is possible only when others have at least a good idea of possible U.S. military reprisals, but cyberattack capabilities resist such demonstration. This report explores ways they can be and under what circumstances, then goes on to examine the difficulties and the drawbacks. Such "brandis... More

    Language: ENG
    Copyright: 2013
  • How Insurgencies End

    How Insurgencies End

    by Martin C. Libicki • Ben Connable

    RAND studied 89 modern insurgency cases to test conventional understanding about how insurgencies end. Findings relevant to policymakers and analysts include that modern insurgencies last about ten years; withdrawal of state support cripples insurgencies; civil defense forces are useful for both sid... More

    Language: ENG
    Copyright: 2010
  • How Terrorist Groups End: Lessons for Countering Al Qa'ida

    How Terrorist Groups End: Lessons for Countering Al Qa'ida

    by Seth G. Jones • Martin C. Libicki

    All terrorist groups eventually end. But how do they end? The evidence since 1968 indicates that most groups have ended because (1) they joined the political process (43 percent) or (2) local police and intelligence agencies arrested or killed key members (40 percent). Military force has rarely been... More

    Language: ENG
    Copyright: 2008
  • The Defender's Dilemma: Charting a Course Toward Cybersecurity

    The Defender's Dilemma: Charting a Course Toward Cybersecurity

    by Martin C. Libicki • Lillian Ablon • Tim Webb

    Cybersecurity is a constant, and, by all accounts growing, challenge. This report, the second in a multiphase study on the future of cybersecurity, reveals perspectives and perceptions from chief information security officers; examines the development of network defense measures and the countermeas... More

    Language: ENG
    Copyright: 2015
  • Dominant Battlespace Knowledge: The Winning Edge

    Dominant Battlespace Knowledge: The Winning Edge

    by Martin C. Libicki • Stuart E. Johnson

    The Department of Defense has been successfully exploiting rapidly developing advances in information technology for military gain. On tomorrow’s multidimensional battlefield—or “battlespace”—the increased density, acuity, and connectivity of sensors and many other information devices may allow U.S.... More

    Language: ENG
    Copyright: 2020
  • H4cker5 Wanted: An Examination of the Cybersecurity Labor Market

    H4cker5 Wanted: An Examination of the Cybersecurity Labor Market

    by Martin C. Libicki • David Senty • Julia Pollak

    The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government... More

    Language: ENG
    Copyright: 2014
  • Global Demographic Change and Its Implications for Military Power

    Global Demographic Change and Its Implications for Military Power

    by Martin C. Libicki • Howard J. Shatz • Julie E. Taylor

    What is the impact of demographics on the prospective production of military power and the causes of war? This monograph analyzes this issue by projecting working-age populations through 2050; assessing the influence of demographics on manpower, national income and expenditures, and human capital; a... More

    Language: ENG
    Copyright: 2011
  • Internet Freedom Software and Illicit Activity: Supporting Human Rights Without Enabling Criminals

    Internet Freedom Software and Illicit Activity: Supporting Human Rights Without Enabling Criminals

    by Martin C. Libicki • Olesya Tkacheva • Sasha Romanosky • Zev Winkelman

    This report examines the portfolio of tools funded by the State Department s Bureau of Democracy, Human Rights, and Labor that help support Internet freedom and assesses the impact of these tools in promoting U. S. interests (such as freedom of expression, freedom of the press, and the free flow of... More

    Language: ENG
    Copyright: 2015
  • Getting to Yes with China in Cyberspace

    Getting to Yes with China in Cyberspace

    by Martin C. Libicki • Scott Warren Harold • Astrid Stuth Cevallos

    This study explores U.S. policy options for managing cyberspace relations with China via agreements and norms of behavior. It considers two questions: Can negotiations lead to meaningful agreement on norms? If so, what does each side need to be prepared to exchange in order to achieve an acceptable ... More

    Language: ENG
    Copyright: 2016
  • Exploring Terrorist Targeting Preferences

    Exploring Terrorist Targeting Preferences

    by Peter Chalk • Martin C. Libicki • Melanie W. Sisson • Melanie Sisson

    Governments spend billions to protect against terrorism. Might it help to understand what al Qaeda would achieve with each specific attack? This book examines various hypotheses of terrorist targeting: is it (1) to coerce, (2) to damage economies, (3) to rally the faithful, or (4) a decision left to... More

    Language: ENG
    Copyright: 2007
  • Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

    Markets for Cybercrime Tools and Stolen Data: Hackers' Bazaar

    by Martin C. Libicki • Lillian Ablon • Andrea A. Golay

    Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets for both tools (e.g., exploit kits) and take (e.g., credit card information). This report, part of a multiphase study on the future security environment, describes the fundamental characteristics of these mark... More

    Language: ENG
    Copyright: 2014
  • Underkill: Scalable Capabilities for Military Operations amid Populations

    Underkill: Scalable Capabilities for Military Operations amid Populations

    by David C. Gompert • David R. Frelinger • Martin C. Libicki • Stuart E. Johnson • John Gordon

    The U.S. military is ill-equipped to strike at extremists who hide in populations. Using deadly force against them can harm and alienate the very people whose cooperation U.S. forces are trying to earn. To solve this problem, a new RAND study proposes a "continuum of force"--a suite of capabilities ... More

    Language: ENG
    Copyright: 2009
  • Byting Back: Regaining Information Superiority Against 21st-Century Insurgents

    Byting Back: Regaining Information Superiority Against 21st-Century Insurgents

    by Raymond Smith • David C. Gompert • David R. Frelinger • Martin C. Libicki

    U.S. counterinsurgency efforts in Iraq and Afghanistan have failed to exploit information power, which could be a U.S. advantage but instead is being used advantageously by insurgents. Because insurgency and counterinsurgency involve a battle for the allegiance of a population between a government a... More

    Language: ENG
    Copyright: 2007
  • Internet Freedom & Political Space

    Internet Freedom & Political Space

    by Lowell H. Schwartz • Martin C. Libicki • Jeffrey Martini • Julie E. Taylor • Caroline Baxter • Olesya Tkacheva

    The Internet is a new battleground between governments that censor online content and those who advocate freedom for all to browse, post, and share information online. This report examines how Internet freedom may transform state-society relations in nondemocratic regimes, using case studies of Chi... More

    Language: ENG
    Copyright: 2013
  • The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996-2017

    The U.S.-China Military Scorecard: Forces, Geography, and the Evolving Balance of Power, 1996-2017

    by David R. Frelinger • Martin C. Libicki • Forrest E. Morgan • Jeff Hagen • Eric Heginbotham • David A. Shlapak • Paul Deluca • Kyle Brady • Lyle J. Morris • Jeffrey Engstrom • Michael Nixon • Jacob L. Heim • Sheng Li • Burgess Laird

    A RAND study analyzed Chinese and U. S. military capabilities in two scenarios (Taiwan and the Spratly Islands) from 1996 to 2017, finding that trends in most, but not all, areas run strongly against the United States. While U. S. aggregate power remains greater than China s, distance and geograp... More

    Language: ENG
    Copyright: 2015
Refine Search
Show More Results

Refine Search

Enter a 10 or 13 digit numerical ISBN code
Categories
Clear

Footer

  • About
  • Partners
  • Legal
  • Accessibility
  • Privacy
  • Contact
  • Blog
Bookshare® and Benetech® are registered trademarks of Beneficent Technology, Inc. This website is © Copyright 2002-2023, Beneficent Technology, Inc.