Conquest in Cyberspace National Security and Information Warfare

ISBN-10: 0521692148
ISBN-13: 9780521692144
Edition: 2007
List price: $34.99 Buy it from $25.25
30 day, 100% satisfaction guarantee

If an item you ordered from TextbookRush does not meet your expectations due to an error on our part, simply fill out a return request and then return it by mail within 30 days of ordering it for a full refund of item cost.

Learn more about our returns policy

Description: Martin Libicki, an internationally known analyst of information systems from a national defense perspective, investigates the entire spectrum of cyberspace from hostile power (computer hacking) to friendly power (e.g. linking systems together in  More...

New Starting from $34.99
what's this?
Rush Rewards U
Members Receive:
You have reached 400 XP and carrot coins. That is the daily max!

Study Briefs

Limited time offer: Get the first one free! (?)

All the information you need in one place! Each Study Brief is a summary of one specific subject; facts, figures, and explanations to help you learn faster.

Add to cart
Study Briefs
Periodic Table Online content $4.95 $1.99
Add to cart
Study Briefs
SQL Online content $4.95 $1.99
Add to cart
Study Briefs
MS Excel® 2010 Online content $4.95 $1.99
Add to cart
Study Briefs
MS Word® 2010 Online content $4.95 $1.99

Customers also bought


Book details

List price: $34.99
Copyright year: 2007
Publisher: Cambridge University Press
Publication date: 4/16/2007
Binding: Paperback
Pages: 336
Size: 5.75" wide x 8.75" long x 0.75" tall
Weight: 0.990
Language: English

Martin Libicki, an internationally known analyst of information systems from a national defense perspective, investigates the entire spectrum of cyberspace from hostile power (computer hacking) to friendly power (e.g. linking systems together in mutual relationships).

List of Figures
What Does Conquest Mean in Cyberspace?
Hostile Conquest as Information Warfare
An Ideal-Type Definition of Information Warfare
Control at One Layer Is Not Control at Another
Applying the Ideal-Type Definition
There Is No Forced Entry in Cyberspace
Information Warfare Only Looks Strategic
IW Strategy and Terrorism
Information Warfare as Noise
Disinformation and Misinformation
Defenses against Noise
What Tolerance for Noise?
Tolerance in Real Environments
Castles and Agoras
Hopping from Agoras to Castles?
Castling Foes
Concluding Observations
Can Information Warfare Be Strategic?
Getting In
Mucking Around
Denial of Service
Damage Assessment
Intelligence Is Necessary
Intelligence Alone Is Hardly Sufficient
Is Information Warfare Ready for War?
The Paradox of Control
Other Weaponization Criteria
Information Warfare against Command and Control
The Sources of Information Overload
Its Effect on Conventional Information Warfare Techniques
Coping Strategies
Who Makes Decisions in a Hierarchy?
Responses to Information Overload
Know the Enemy's Information Architecture
Elements of Information Culture
Elements of Nodal Architecture
Injecting Information into Adversary Decision Making
Ping, Echo, Flood, and Sag
Ping and Echo
Flood and Sag
Friendly Conquest in Cyberspace
A Redefinition of Conquest
The Mechanisms of Coalitions
The Particular Benefits of Coalitions
Information and Coalitions
The Cost of Coalitions in Cyberspace
Enterprise Architectures and Influence
Alliances with Individuals
The Special Case of Cell Phones
Alliances of Organizations
Ecologies of Technological Development
DoD's Global Information Grid (GIG)
Merging the Infrastructures of Allies
Friendly Conquest Using Global Systems
Geospatial Data
Coping with Commercial Satellites
Manipulation through Cyberspace
Getting Others to Play the Game
Some Conclusions about Geospatial Services
National Identity Systems
Two Rationales for a National Identity System
Potential Parameters for a Notional System
Constraints from and Influences over Foreign Systems
Compare, Contrast, and Conclude
Retail Conquest in Cyberspace
Information Trunks and Leaves
Where Does Cheap Information Come From?
Surveillance in Cyberspace
Making Information Global
Amalgamating Private Information
Using the Information
General Coercion
Specific Coercion
Some Limits of Retail Warfare in Cyberspace
Using Retail Channels to Measure Wholesale Campaigns
From Intimacy, Vulnerability
Do the Walls Really Come Down?
Intimacy as a Target
The Fecklessness of Friends
Talking Conquest in Cyberspace
Four Layers of Communications
Human Conversation in Layers
Cyberspace in Layers
Complexity Facilitates Conquest
Complexity and Hostile Conquest
Complexity and Friendly Conquest
Managing Conquest in Cyberspace
Conducting Hostile Conquest in Cyberspace
Warding Off Hostile Conquest in Cyberspace
Byte Bullies
Headless Horsemen
Perfect Prevention
Total Transparency
Nasty Neighborhoods
Exploiting Unwarranted Influence
Against Unwarranted Influence
In Microsoft's Shadow
Microsoft and Computer Security
Why Cyberspace Is Likely to Gain Consequence
More Powerful Hardware and Thus More Complex Software
Cyberspace in More Places
Fuzzier Borders between Systems
Accepted Cryptography
Privatized Trust
The Possible Substitution of Artificial for Natural Intelligence

Free shipping on orders over $35*

*A minimum purchase of $35 is required. Shipping is provided via FedEx SmartPost® and FedEx Express Saver®. Average delivery time is 1 – 5 business days, but is not guaranteed in that timeframe. Also allow 1 - 2 days for processing. Free shipping is eligible only in the continental United States and excludes Hawaii, Alaska and Puerto Rico. FedEx service marks used by permission."Marketplace" orders are not eligible for free or discounted shipping.

Learn more about the TextbookRush Marketplace.