23,95 €
23,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
12 °P sammeln
23,95 €
23,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
12 °P sammeln
Als Download kaufen
23,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
12 °P sammeln
Jetzt verschenken
23,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
12 °P sammeln
  • Format: PDF

With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The…mehr

  • Geräte: PC
  • mit Kopierschutz
  • eBook Hilfe
  • Größe: 2.22MB
  • FamilySharing(5)
Produktbeschreibung
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The author also investigates how far 'friendly conquest' in cyberspace extends, such as the power to persuade users to adopt new points of view. He discusses the role of public policy in managing cyberspace conquests and shows how the Internet is becoming more ubiquitous and complex, such as in the use of artificial intelligence.

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Martin C. Libicki, a Senior Policy Analyst at the RAND Corporation since 1998, works on the relationship between information technology and national security. He has written numerous monographs on the subject, notably What is Information Warfare, The Mesh and the Net: Speculations on Armed Conflict in a Time of Free Silicon, and Who Runs What in the Global Information Grid. Dr Libicki is also the editor of the RAND Textbook, New Challenges, New Tools for Defense Decisionmaking. His most recent assignments at RAND have been to develop a post-9/11 information technology strategy for the U.S. Department of Justice and DARPA's Terrorist Information Awareness program, conduct an information security analysis for the FBI, investigate targeting strategies of al Queda, and assess CIA's R&D venture, In-Q-Tel. He previously taught at the National Defense University. Dr Libicki received his Ph.D. from the University of California at Berkeley in 1978.