|
Sort Order |
|
|
|
Items / Page
|
|
|
|
|
|
|
Srl | Item |
1 |
ID:
142686
|
|
|
Summary/Abstract |
Cyberspace is increasingly becoming an area of contestation among nation states. Similar to the physical domains of land, sea, air and space, superiority in the cyber domain enables a nation state to exert its cyber power. In recent years, China has invested colossal amounts in building the requisite infrastructure and capabilities of its armed forces as well as governance practices to advance towards ‘informationalisation’. This article seeks to discern the motives, threats, objectives, strategy and intent that drive China to amass cyber power.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
136033
|
|
|
Summary/Abstract |
Technology has always played the key role in defining the outcome of war. A modern-day military is investing in cutting-edge technologies to leverage their benefits in the evolving nature of warfare, which encompasses every aspect of science. In the case of information and communication technology (ICT), the research and development has unleashed vast potential for civilian and military applications, which vary from simple logic execution to high-end supercomputing. As cloud computing has made inroads in the operations of private sector, it is slated to perform a central role in the functioning of governments and defence and security agencies. Under the aegis of ICT, the emerging cloud computing can find applications in defence sector as it offers numerous advantages over traditional information technology (IT) systems such as scalability, agility and interoperability. The article is an attempt to identify the key defence operations where cloud computing could help in addressing the IT needs while keeping the acquisition and maintenance costs at minimal. It brings in the concerns and challenges lying ahead in the way of adopting cloud computing while taking stock of initiatives taken by the governments of leading militaries of the world.
|
|
|
|
|
|
|
|
|
|
3 |
ID:
136778
|
|
|
Summary/Abstract |
There is an intricate relationship between the methods of cyber espionage and the evolution of information and communications technology, of which information security is a key aspect. This article is an attempt to establish forward and backward linkages of cyber espionage. It examines the geopolitics, methods, role of information security technology and, most importantly, how the future of cyber espionage is being shaped by emerging technologies such as supercomputing, quantum computing and ‘big data’, from an Indian perspective.
|
|
|
|
|
|
|
|
|
|
4 |
ID:
162273
|
|
|
Publication |
New Delhi, Pentagon Press, 2019.
|
Description |
xv, 175p.hbk
|
Standard Number |
9789386618665
|
|
|
|
|
|
|
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
059544 | 005.8/SAM 059544 | Main | On Shelf | General | |
059545 | 005.8/SAM 059545 | Main | On Shelf | General | |
|
|
|
|
5 |
ID:
177282
|
|
|
Summary/Abstract |
The article makes an attempt to bring to the fore the various factors which are considered in the due process of attribution of a cyber-attack and the correlation of credible attribution with cyber deterrence. The focal point of the article is a three-step approach to model the decision-making process behind attribution of cyber-attacks using Bayesian Belief Networks and a case study to elucidate on the functioning of the model. Bayesian Belief Networks represent relationships between variables or multiple events and they are used to draw inference or estimate the probability to help decision-making under the conditions of uncertainty.
|
|
|
|
|
|
|
|
|
|
6 |
ID:
132138
|
|
|
Publication |
2014.
|
Summary/Abstract |
Technology has always played the key role in defining the outcome of war. A modern-day military is investing in cutting-edge technologies to leverage their benefits in the evolving nature of warfare, which encompasses every aspect of science. In the case of information and communication technology (ICT), the research and development has unleashed vast potential for civilian and military applications, which vary from simple logic execution to high-end supercomputing. As cloud computing has made inroads in the operations of private sector, it is slated to perform a central role in the functioning of governments and defence and security agencies. Under the aegis of ICT, the emerging cloud computing can find applications in defence sector as it offers numerous advantages over traditional information technology (IT) systems such as scalability, agility and interoperability. The article is an attempt to identify the key defence operations where cloud computing could help in addressing the IT needs while keeping the acquisition and maintenance costs at minimal. It brings in the concerns and challenges lying ahead in the way of adopting cloud computing while taking stock of initiatives taken by the governments of leading militaries of the world.
|
|
|
|
|
|
|
|
|
|
7 |
ID:
169766
|
|
|
Publication |
New Delhi, IDSA, 2019.
|
Description |
120p.pbk
|
Series |
IDSA Monograph Series no; 65
|
Standard Number |
9789382169888
|
|
|
|
|
|
|
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
059788 | 621.38456/SHA 059788 | Main | On Shelf | General | |
059789 | 621.38456/SHA 059789 | Main | On Shelf | General | |
|
|
|
|
8 |
ID:
152435
|
|
|
Publication |
New Delhi, IDSA, 2017.
|
Description |
116p.pbk
|
Series |
IDSA Monograph Series no.; 60
|
Standard Number |
9789382169741
|
|
|
|
|
|
|
Copies: C:2/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
059013 | 004.3/SHA 059013 | Main | On Shelf | General | |
059014 | 004.3/SHA 059014 | Main | On Shelf | General | |
|
|
|
|
|
|
|
|
|