To see the other types of publications on this topic, follow the link: Cyber deterrence.

Books on the topic 'Cyber deterrence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 36 books for your research on the topic 'Cyber deterrence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Tan, Eugene E. G. Cyber deterrence in Singapore: Frameworks & recommendations. S. Rajaratnam School of International Studies, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

author, Thayer Bradley A., ed. Deterring cyber warfare: Bolstering strategic stability in cyberspace. Palgrave Macmillan, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brantly, Aaron F. Cyber Deterrence Problem. Rowman & Littlefield Publishers, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Brantly, Aaron F. Cyber Deterrence Problem. Rowman & Littlefield Publishers, Incorporated, 2020.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Strategic Cyber Deterrence. Rowman & Littlefield Publishers, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jasper, Scott. Strategic Cyber Deterrence: The. Rowman & Littlefield Publishers, Incorporated, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kello, Lucas. Cyber Defence. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0039.

Full text
Abstract:
Europe confronts an enormous cyber threat. The continent hosted the first international cyber crisis—the 2007 attacks by Russian political activists that crashed computer infrastructures in Estonia. Large European nations such as the UK and France focus their defensive efforts on proactive measures, which seek to neutralize threats before they materialize. Another tool of large powers is deterrence by punishment, an attempt to prevent hostile action with the pledge of severe reprisal. Smaller powers, by contrast, lack the resources necessary to implement proactive measures or deterrence. They
APA, Harvard, Vancouver, ISO, and other styles
8

Department of Defense. 2017 Cyber Attack Deterrence: Defense Science Board Task Force on Cyber Deterrence - Developing Scalable Strategic Offensive Cyber Capabilities, Resilience of U. S. Nuclear Weapons, Attribution. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cyber Security Deterrence And It Protection For Critical Infrastructures. Springer International Publishing AG, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Martellini, Maurizio. Cyber Security: Deterrence and IT Protection for Critical Infrastructures. Springer London, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Whyte, Christopher, and Brian Mazanec. Understanding Cyber Warfare: Politics, Policy and Strategy. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Whyte, Christopher, and Brian M. Mazanec. Understanding Cyber-Warfare: Politics, Policy and Strategy. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Whyte, Christopher, and Brian Mazanec. Understanding Cyber Warfare: Politics, Policy and Strategy. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Whyte, Christopher, and Brian M. Mazanec. Understanding Cyber-Warfare: Politics, Policy and Strategy. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Mazanec, Brian M., and B. Thayer. Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace. Palgrave Pivot, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Understanding Cyber Warfare. Routledge, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Gartzke, Eric, and Jon R. Lindsay. Cross-Domain Deterrence. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190908645.001.0001.

Full text
Abstract:
The complexity of the twenty-first century threat landscape contrasts significantly with the bilateral nuclear bargaining context envisioned by classical deterrence theory. Nuclear and conventional arsenals continue to develop alongside antisatellite programs, autonomous robotics or drones, cyber operations, biotechnology, and other innovations barely imagined in the early nuclear age. The concept of cross-domain deterrence emerged near the end of the George W. Bush administration as policymakers and commanders confronted emerging threats to vital American military systems in space and cybersp
APA, Harvard, Vancouver, ISO, and other styles
18

Katagiri, Nori. How Liberal Democracies Defend Their Cyber Networks from Hackers: Strategies of Deterrence. Palgrave Macmillan, 2024.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Welburn, Jonathan, Justin Grana, and Karen Schwindt. Cyber Deterrence or: How We Learned to Stop Worrying and Love the Signal. RAND Corporation, 2019. http://dx.doi.org/10.7249/wr1294.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Whyte, Christopher, and Brian Mazanec. Understanding Cyber Warfare: Politics, Policy and Strategy. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Whyte, Christopher, and Brian Mazanec. Understanding Cyber Warfare: Politics, Policy and Strategy. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Whyte, Christopher, and Brian M. Mazanec. Understanding Cyber-Warfare: Politics, Policy and Strategy. Taylor & Francis Group, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Whyte, Christopher, and Brian M. Mazanec. Understanding Cyber Warfare: Politics, Policy and Strategy. Routledge, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

Whyte, Christopher, Brian Mazanec, and Angelos Stavrou. Understanding Cyber-Warfare: Politics, Policy and Strategy. Taylor & Francis Group, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Understanding Cyber Warfare: Politics, Policy and Strategy. Routledge, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Maness, Ryan C., and Brandon Valeriano. International Cyber Conflict and National Security. Edited by Derek S. Reveron, Nikolas K. Gvosdev, and John A. Cloud. Oxford University Press, 2018. http://dx.doi.org/10.1093/oxfordhb/9780190680015.013.25.

Full text
Abstract:
Cyber conflict is often called the fifth domain of conflict. As more and more systems, networks, and information become digitized, there is contestation as to the growing nature of the threat and how exactly this domain can be exploited to coerce the enemy for either geopolitical or financial gain. Some argue that the cyber threat is exponentially growing and that offensive dominance reigns, making cyber conflict extremely unstable. Others contest that the threat is overblown and is more socially constructed. In this chapter we take a middle ground and find that much of the cyber conflict and
APA, Harvard, Vancouver, ISO, and other styles
27

Department of Defense. Flexible Options for Cyber Deterrence - Terrorism, Problem of Attribution, Cyber Attack, Espionage, Defense, Nation State Peer Competitors, China Conflict, SCADA, Network Equipment. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

Goldsmith, Jack, ed. The United States' Defend Forward Cyber Strategy. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197601792.001.0001.

Full text
Abstract:
The United States’ new Defend Forward Strategy constitutes a major change in how the nation with the world’s most powerful cyber arsenal views when and how this arsenal should be deployed. It is a large step in the direction of more aggressive action in cyberspace—albeit for defensive ends. The United States has not attempted to hide this new and more aggressive cyber posture. To the contrary, it has telegraphed the change, probably in order to enhance deterrence. But the telegraphing has taken place at a highly abstract level. Very little is known about precisely what types of operations Defe
APA, Harvard, Vancouver, ISO, and other styles
29

Cordesman, Anthony H. Cyber-threats, Information Warfare, and Critical Infrastructure Protection. Praeger, 2001. http://dx.doi.org/10.5040/9798400636509.

Full text
Abstract:
During the last two decades, the infrastructure of the U.S. economy has undergone a fundamental set of changes. It has steadily increased its reliance on its service sector and high-technology economy. The U.S. has come to depend on computers, electronic data storage and transfers, and highly integrated communications networks. The result is the rapid development of a new form of critical infrastructure--and one that is exceedingly vulnerable to a new family of threats, loosely grouped together as information warfare. This detailed volume examines these threats and the evolving U.S. policy res
APA, Harvard, Vancouver, ISO, and other styles
30

Cimbala, Stephen J. Strategic Impasse. Praeger, 1989. http://dx.doi.org/10.5040/9798216987789.

Full text
Abstract:
There is probably no area of more crucial concern nor one more subject to possible misunderstanding and riddled with paradox than nuclear weapons and their use, not only in war, but as deterrents to war. In Strategic Impasse, Cimbala examines the critical issues, problems, and paradoxes inherent in the current nuclear situation. It is from a fundamental contradiction--the usefulness of nuclear weapons versus the undesirability of nuclear war--that nuclear deadlock arises. Their usefulness as deterrents is based on their destructive potential and the balance of power in Europe cannot be adjuste
APA, Harvard, Vancouver, ISO, and other styles
31

Department of Defense. When Norms Fail: North Korea and Cyber As an Element of Statecraft - Review of Notable Darkseoul and Sony Pictures Hack Korean Cyber Attacks, Deterrence and Coercion, and Escalation Dominance. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Walker, William. The International Nuclear Order after the Cold War—Progress and Regress. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198828945.003.0005.

Full text
Abstract:
The nuclear weapon’s emergence as an instrument of rivalry and deterrence, coupled with desire to use nuclear technology for civil purposes, created a pressing need, which continues, for the regulation of nuclear activity and relations. During the Cold War, a rule-based international nuclear order took shape around institutions of arms control and non-proliferation, resting upon ideas of mutual restraint, obligation, and eventual abolition whilst maintaining room for nuclear deterrence in specific contexts. Extended and deepened between the mid-1980s and 1990s, the order has since suffered a l
APA, Harvard, Vancouver, ISO, and other styles
33

Department of Defense. Cyber Attacks, Attribution, and Deterrence: Case Studies - Stuxnet Attack on Iran, LulzSec, and Estonian Attacks, Protection of Cyberspace and Digital Infrastructure As Vital to National Security. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Guitton, Clement. Introduction. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190699994.003.0001.

Full text
Abstract:
The introduction sets to explain why it is important to look at the question of attribution: in short, it is central to defense and deterrence strategies. Furthermore, the introduction presents the different nuances of sponsorships to distinguish: from writing code without being aware of its intended malicious use, to states refusing to cooperate in investigations. The chapter goes on with exposing three common misconceptions that have permeated the debate on attribution: that it is a technical problem; that it is unsolvable; and that it is unique. These misconceptions will be debunked in turn
APA, Harvard, Vancouver, ISO, and other styles
35

Echevarria II, Antulio J. Military Strategy: A Very Short Introduction. Oxford University PressNew York, 2024. http://dx.doi.org/10.1093/actrade/9780197760154.001.0001.

Full text
Abstract:
Abstract Military strategy plays a vital role in every conflict. Inspired by the great military theoreticians Sun Tzu, Niccolò Machiavelli, and Carl von Clausewitz, Military Strategy: A Very Short Introduction highlights the dynamic relationship among the principal components of strategy: purpose, method, and means. It draws on examples such as Hannibal’s war against Rome, Napoleon’s victory at Austerlitz, the Allies’ campaign to overwhelm Hitler’s Fortress Europe, and the terror attacks of September 11, 2001, to illustrate the factors contributing to the success or failure of military strateg
APA, Harvard, Vancouver, ISO, and other styles
36

Department of Defense. Nothing New under the Sun: Benefiting from the Great Lessons of History to Develop a Coherent Cyberspace Deterrence Strategy - the Problems of Cyber War, Iraq, and the Cuban Missile Crisis. Independently Published, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!