Cyberdeterrence and Cyberwar cover art

Cyberdeterrence and Cyberwar

Preview

£0.00 for first 30 days

Try for £0.00
Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.

Cyberdeterrence and Cyberwar

By: Martin C. Libicki
Narrated by: Erik Sandvold
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £14.99

Buy Now for £14.99

Confirm Purchase
Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.
Cancel

About this listen

The protection of cyberspace, the information medium, has become a vital national interest because of its importance both to the economy and to military power. An attacker may tamper with networks to steal information for money or to disrupt operations. Future wars are likely to be carried out, in part or perhaps entirely, in cyberspace. It might therefore seem obvious that maneuvering in cyberspace is like maneuvering in other media, but nothing would be more misleading.

Cyberspace has its own laws. It is easy to hide identities and difficult to predict or even understand battle damage, and attacks deplete themselves quickly. Cyberwar is nothing so much as the manipulation of ambiguity.

Martin Libicki explores these topics in detail and uses the results to address such issues as the pros and cons of counterattack, the value of deterrence and vigilance, and other actions the United States and the U.S. Air Force can take to protect itself in the face of deliberate cyberattack.

©2009 RAND Corporation (P)2010 Blackstone Audio, Inc.
Freedom & Security Military Military science Security & Encryption War & Crisis Espionage National Security Computer Security Cyber warfare Hacking War Cyberattack US Air Force United States Air Force
activate_Holiday_promo_in_buybox_DT_T2

Listeners also enjoyed...

Understanding Cyber Conflict: 14 Analogies cover art
Digital Resilience cover art
Of Privacy and Power cover art
The Hacked World Order cover art
Listening In cover art
Complex Battlespaces cover art
Obfuscation cover art
Lords of Secrecy cover art
Decision Making in a Nuclear Middle East cover art
Rocket Man cover art
Cybersecurity cover art
Cybersecurity First Principles cover art
The Singularity Principles cover art
We Have Root cover art
Navigating New Cyber Risks cover art
Exposed cover art

What listeners say about Cyberdeterrence and Cyberwar

Average customer ratings
Overall
  • 2.5 out of 5 stars
  • 5 Stars
    0
  • 4 Stars
    5
  • 3 Stars
    5
  • 2 Stars
    5
  • 1 Stars
    4
Performance
  • 3 out of 5 stars
  • 5 Stars
    1
  • 4 Stars
    1
  • 3 Stars
    0
  • 2 Stars
    0
  • 1 Stars
    2
Story
  • 3 out of 5 stars
  • 5 Stars
    0
  • 4 Stars
    2
  • 3 Stars
    1
  • 2 Stars
    1
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    2 out of 5 stars

Maybe...

The word 'may' is used approximately in every second sentence of this small book that grabbles with the challenges of cyberwarfare (including defining it). Basically the conclusion is that a robust defense of your digital infrastructure and systems seems the wisest course of action, while cyber attack and associated attempts to both deter and retaliate in the traditional paradigms of both conventional and nuclear warfare seems to elusive in terms of predictable and sustainable capabilities and effects. The sophistry of the arguments leave the reader more confused than enlightened, but that MAY be the exact intention.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    2 out of 5 stars

Better than sleeping pills... ZZZzzzzz!

I was so disappointed! This book promised to be a fascinating examination of the new theatre of war: Cyberspace. I imagined scenarios depicting the consequences of hacker attacks on crucial targets such as banks, stock markets, military computers, air traffic control etc. and possible countermeasures we could defend ourselves with.

Sadly, for much of the book it is an exhaustive examination of when and if we would use deterrence. There are some interesting snippets, such as diplomatic representations concerning possible 'trojan horse' components made in China, present in almost every computer. Also the three levels of cyberspace (physical, syntactic, semantic), and where attacks would take place. However, these were island of interest in an ocean of dull dull dull debate... Sent me to sleep every time...

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

2 people found this helpful

  • Overall
    1 out of 5 stars

Dull

A dull, dour reading, waste of money.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

1 person found this helpful

  • Overall
    1 out of 5 stars
  • Performance
    1 out of 5 stars
  • Story
    3 out of 5 stars

Poor

How this specialist subject is beyond me. I thought there would be some snippet of useful info there. I was wrong

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!