Jack A. Jarmon
The New Era in U.S. National Security: Challenges of the Information Age
Jack A. Jarmon
The New Era in U.S. National Security: Challenges of the Information Age
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The second edition of The New Era offers students and instructors a whole cloth, insightful perspective on the dynamic, changing patterns and orientations unleashed by the processes of globalization, technology, and the emerging ¿Second Cold War¿ era.
Andere Kunden interessierten sich auch für
- Jonathan MeadIndian National Security: Misguided Men and Guided Missiles70,99 €
- Ralph PetersLines of Fire: A Renegade Writes on Strategy, Intelligence, and Security25,99 €
- Victor-Yves GhebaliThe OSCE Code of Conduct on Politico-Military Aspects of Security: Anatomy and Implementation275,99 €
- Amitav MallikTechnology and Security in the 21st Century: A Demand-Side Perspective23,99 €
- Steven WrightThe United States and Persian Gulf Security: The Foundations of the War on Terror57,99 €
- Barak MendelsohnCombating Jihadism: American Hegemony and Interstate Cooperation in the War on Terrorism107,99 €
- Gregory MaccallionNational Versus Human Security: Australian and Canadian Military Interventions53,99 €
-
-
-
The second edition of The New Era offers students and instructors a whole cloth, insightful perspective on the dynamic, changing patterns and orientations unleashed by the processes of globalization, technology, and the emerging ¿Second Cold War¿ era.
Produktdetails
- Produktdetails
- Verlag: Rowman & Littlefield Publishing Group Inc
- Seitenzahl: 376
- Erscheinungstermin: 24. Oktober 2019
- Englisch
- Abmessung: 231mm x 150mm x 20mm
- Gewicht: 544g
- ISBN-13: 9781538121597
- ISBN-10: 153812159X
- Artikelnr.: 57120210
- Verlag: Rowman & Littlefield Publishing Group Inc
- Seitenzahl: 376
- Erscheinungstermin: 24. Oktober 2019
- Englisch
- Abmessung: 231mm x 150mm x 20mm
- Gewicht: 544g
- ISBN-13: 9781538121597
- ISBN-10: 153812159X
- Artikelnr.: 57120210
By Jack A. Jarmon
Preface 1. The National Security Establishment The United State and the World Stage A Brief History of the Structure The New Reorganization Budgeting, and Planning in Support of Policy Striking a Balance between Domestic and Foreign Affairs Conclusion 2. Policies and Process and the New Geopolitics Evolution of Strategy An Era of New Weaponry and Geopolitics The Role of the Private Sector The Status and Future of DHS Conclusion 3. Irregular Warfare and Information Age Weapons Asymmetric Warfare A World of Weapons The Phenomenon of Social Media The Weaponization of Social Media Audience Mapping, Targeted Messaging, and
Kompromat
The Weaponization of Information Conclusion 4. Conflict and Economics Technology, the Information Age, and the Costs of War Global Economics and Migration The Rise of Kleptocracy Non-Asymmetric Warfare Conclusion 5. A Vast and Contested Domain Information Technology vs Operational Technology National Critical Infrastructure The Election Infrastructure Big Data Machine learning Artificial Intelligence & Autonomous Weapons Systems Conclusion 6. Cyberspace and Conflict What is Cyberspace? The Inception The Militarization The Malware Advanced Persistent Threat (APT) The Onion Router (TOR) The Deep and Dark Web Conclusion 7. China The Belt and Road Initiative A Cyber Cold War
Kill with a Borrowed Sword
The Great Firewall and the Great Cannon A Sprawling National Security Environment Conclusion 8. Russia Cold War 2.0 The Merger of Politics and Criminality Active Measures and Cyberwarriors Ukraine, 2014 United States, 2016 Tactical Nuclear Weapons Conclusion 9. The Maritime Supply Chain Vast, Diverse, and Anarchic Containerization Targeting, Screening, Scanning, and Inspecting Trusted Shippers and Layered Defenses Calculating the Dangers and the Risk An Opaque and Expanding Environment Choke Points Conclusion 10. Politics, Crime, and Terror Crime and Terrorism: Differences and Similarities Crime and Terrorism: The Nexus West Toward Chechnya and Russia The Tri-Border Area (TBA) Chinese Triads Conclusion 11. Chemical, Biological, Radiological & Nuclear Threats Chemical Warfare Resurgence in Chemical Weapons Chemical Agents Threats and Countermeasures Non-Terrorist Threats Biological Threats Biological Agents Synthetic Biology Biosecurity Policy Radiological and Nuclear Threats What is radioactivity? So, You Want to Build a Bomb? The Dirty Bomb Alternative Controlling proliferation Conclusion
Kompromat
The Weaponization of Information Conclusion 4. Conflict and Economics Technology, the Information Age, and the Costs of War Global Economics and Migration The Rise of Kleptocracy Non-Asymmetric Warfare Conclusion 5. A Vast and Contested Domain Information Technology vs Operational Technology National Critical Infrastructure The Election Infrastructure Big Data Machine learning Artificial Intelligence & Autonomous Weapons Systems Conclusion 6. Cyberspace and Conflict What is Cyberspace? The Inception The Militarization The Malware Advanced Persistent Threat (APT) The Onion Router (TOR) The Deep and Dark Web Conclusion 7. China The Belt and Road Initiative A Cyber Cold War
Kill with a Borrowed Sword
The Great Firewall and the Great Cannon A Sprawling National Security Environment Conclusion 8. Russia Cold War 2.0 The Merger of Politics and Criminality Active Measures and Cyberwarriors Ukraine, 2014 United States, 2016 Tactical Nuclear Weapons Conclusion 9. The Maritime Supply Chain Vast, Diverse, and Anarchic Containerization Targeting, Screening, Scanning, and Inspecting Trusted Shippers and Layered Defenses Calculating the Dangers and the Risk An Opaque and Expanding Environment Choke Points Conclusion 10. Politics, Crime, and Terror Crime and Terrorism: Differences and Similarities Crime and Terrorism: The Nexus West Toward Chechnya and Russia The Tri-Border Area (TBA) Chinese Triads Conclusion 11. Chemical, Biological, Radiological & Nuclear Threats Chemical Warfare Resurgence in Chemical Weapons Chemical Agents Threats and Countermeasures Non-Terrorist Threats Biological Threats Biological Agents Synthetic Biology Biosecurity Policy Radiological and Nuclear Threats What is radioactivity? So, You Want to Build a Bomb? The Dirty Bomb Alternative Controlling proliferation Conclusion
Preface 1. The National Security Establishment The United State and the World Stage A Brief History of the Structure The New Reorganization Budgeting, and Planning in Support of Policy Striking a Balance between Domestic and Foreign Affairs Conclusion 2. Policies and Process and the New Geopolitics Evolution of Strategy An Era of New Weaponry and Geopolitics The Role of the Private Sector The Status and Future of DHS Conclusion 3. Irregular Warfare and Information Age Weapons Asymmetric Warfare A World of Weapons The Phenomenon of Social Media The Weaponization of Social Media Audience Mapping, Targeted Messaging, and
Kompromat
The Weaponization of Information Conclusion 4. Conflict and Economics Technology, the Information Age, and the Costs of War Global Economics and Migration The Rise of Kleptocracy Non-Asymmetric Warfare Conclusion 5. A Vast and Contested Domain Information Technology vs Operational Technology National Critical Infrastructure The Election Infrastructure Big Data Machine learning Artificial Intelligence & Autonomous Weapons Systems Conclusion 6. Cyberspace and Conflict What is Cyberspace? The Inception The Militarization The Malware Advanced Persistent Threat (APT) The Onion Router (TOR) The Deep and Dark Web Conclusion 7. China The Belt and Road Initiative A Cyber Cold War
Kill with a Borrowed Sword
The Great Firewall and the Great Cannon A Sprawling National Security Environment Conclusion 8. Russia Cold War 2.0 The Merger of Politics and Criminality Active Measures and Cyberwarriors Ukraine, 2014 United States, 2016 Tactical Nuclear Weapons Conclusion 9. The Maritime Supply Chain Vast, Diverse, and Anarchic Containerization Targeting, Screening, Scanning, and Inspecting Trusted Shippers and Layered Defenses Calculating the Dangers and the Risk An Opaque and Expanding Environment Choke Points Conclusion 10. Politics, Crime, and Terror Crime and Terrorism: Differences and Similarities Crime and Terrorism: The Nexus West Toward Chechnya and Russia The Tri-Border Area (TBA) Chinese Triads Conclusion 11. Chemical, Biological, Radiological & Nuclear Threats Chemical Warfare Resurgence in Chemical Weapons Chemical Agents Threats and Countermeasures Non-Terrorist Threats Biological Threats Biological Agents Synthetic Biology Biosecurity Policy Radiological and Nuclear Threats What is radioactivity? So, You Want to Build a Bomb? The Dirty Bomb Alternative Controlling proliferation Conclusion
Kompromat
The Weaponization of Information Conclusion 4. Conflict and Economics Technology, the Information Age, and the Costs of War Global Economics and Migration The Rise of Kleptocracy Non-Asymmetric Warfare Conclusion 5. A Vast and Contested Domain Information Technology vs Operational Technology National Critical Infrastructure The Election Infrastructure Big Data Machine learning Artificial Intelligence & Autonomous Weapons Systems Conclusion 6. Cyberspace and Conflict What is Cyberspace? The Inception The Militarization The Malware Advanced Persistent Threat (APT) The Onion Router (TOR) The Deep and Dark Web Conclusion 7. China The Belt and Road Initiative A Cyber Cold War
Kill with a Borrowed Sword
The Great Firewall and the Great Cannon A Sprawling National Security Environment Conclusion 8. Russia Cold War 2.0 The Merger of Politics and Criminality Active Measures and Cyberwarriors Ukraine, 2014 United States, 2016 Tactical Nuclear Weapons Conclusion 9. The Maritime Supply Chain Vast, Diverse, and Anarchic Containerization Targeting, Screening, Scanning, and Inspecting Trusted Shippers and Layered Defenses Calculating the Dangers and the Risk An Opaque and Expanding Environment Choke Points Conclusion 10. Politics, Crime, and Terror Crime and Terrorism: Differences and Similarities Crime and Terrorism: The Nexus West Toward Chechnya and Russia The Tri-Border Area (TBA) Chinese Triads Conclusion 11. Chemical, Biological, Radiological & Nuclear Threats Chemical Warfare Resurgence in Chemical Weapons Chemical Agents Threats and Countermeasures Non-Terrorist Threats Biological Threats Biological Agents Synthetic Biology Biosecurity Policy Radiological and Nuclear Threats What is radioactivity? So, You Want to Build a Bomb? The Dirty Bomb Alternative Controlling proliferation Conclusion