|
Sort Order |
|
|
|
Items / Page
|
|
|
|
|
|
|
Srl | Item |
1 |
ID:
145587
|
|
|
Summary/Abstract |
Appearances in cyberspace are deceptive and problematic. Deception in the cyber domain poses an immensely difficult challenge for states to differentiate between espionage activities in cyberspace and cyber attacks. The inability to distinguish between cyber activities places US cyber infrastructure in a perilous position and increases the possibility of a disproportionate or inadequate response to cyber incidents. This paper uses case analysis to examine the characteristics associated with the tools and decisions related to cyber espionage and cyber attacks to develop a framework for distinction leveraging epidemiological models for combating disease.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
037977
|
|
|
Publication |
New York, Harber & Brothers Publishers, 1957.
|
Description |
xi, 266p.
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
011688 | 355.3432/BAB 011688 | Main | On Shelf | General | |
|
|
|
|
3 |
ID:
123884
|
|
|
Publication |
2013.
|
Summary/Abstract |
In this article, the author discusses strategic defense initiative for cyberspace citing reference to an address delivered by U.S. President Barack Obama who warned people of consequences of cyber-attacks. Also discussed is an announcement made by the cyber security company Mandiant Corp. accusing China of a sponsored campaigns of cyber-espionage.
|
|
|
|
|
|
|
|
|
|
4 |
ID:
042496
|
|
|
Publication |
London, Hamish Hamilton, 1985.
|
Description |
249p.
|
Standard Number |
0241115450
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
025892 | 355.3432/SUV 025892 | Main | On Shelf | General | |
|
|
|
|
5 |
ID:
032344
|
|
|
Publication |
London, Robert Hale, 1965.
|
Description |
191p.
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
002018 | 327.12/ALT 002018 | Main | On Shelf | General | |
|
|
|
|
6 |
ID:
043411
|
|
|
Publication |
Englewood Cliffs, Prentice-Hall, 1970.
|
Description |
vii, 471p.
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
004881 | 323/BAR 004881 | Main | On Shelf | General | |
|
|
|
|
7 |
ID:
038295
|
|
|
Publication |
London, Aldus Books Limited, 1977.
|
Description |
144p
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
016876 | 327.12/WAY 016876 | Main | On Shelf | General | |
|
|
|
|
8 |
ID:
192044
|
|
|
Summary/Abstract |
Participants in an innovation contest may steal their opponents’ ideas to enhance their chance of winning. To model this, I introduce the ability to copy another player’s effort in a Tullock contest between two players. I characterise the unique equilibrium in this game dependent on the cost of copying and one of the players’ productivity advantage. If the cost of copying is low, the less productive player is more likely to win the contest. The model’s comparative statics have important implications for governments who subsidise firms in contests and for contest designers.
|
|
|
|
|
|
|
|
|
|
9 |
ID:
111149
|
|
|
Publication |
2012.
|
Summary/Abstract |
For almost two decades, experts and defense establishments the world over have been predicting that cyber war is coming. But is it? This article argues in three steps that cyber war has never happened in the past, that cyber war does not take place in the present, and that it is unlikely that cyber war will occur in the future. It first outlines what would constitute cyber war: a potentially lethal, instrumental, and political act of force conducted through malicious code. The second part shows what cyber war is not, case-by-case. Not one single cyber offense on record constitutes an act of war on its own. The final part offers a more nuanced terminology to come to terms with cyber attacks. All politically motivated cyber attacks are merely sophisticated versions of three activities that are as old as warfare itself: sabotage, espionage, and subversion.
|
|
|
|
|
|
|
|
|
|
10 |
ID:
107766
|
|
|
Publication |
Amsterdam, Elsevier, 2011.
|
Description |
xi, 254p.
|
Standard Number |
9781597596131, hbk
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
056256 | 364.168/GRA 056256 | Main | On Shelf | General | |
|
|
|
|
11 |
ID:
038013
|
|
|
Publication |
London, Hamish Hamilton, 1970.
|
Description |
x, 285p.
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
005011 | 327.12/BUR 005011 | Main | On Shelf | General | |
|
|
|
|
12 |
ID:
032623
|
|
|
Publication |
London, Zed Press, 1978.
|
Description |
318p
|
Standard Number |
0862320453
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
020515 | 327.1273040/AGE 020515 | Main | On Shelf | General | |
|
|
|
|
13 |
ID:
082241
|
|
|
Publication |
2008.
|
Summary/Abstract |
East Germany was one of the main actors in Cold War military and security policy intelligence. Due to the opening of the archives of the Ministry for State Security (Stasi) of the German Democratic Republic it is possible today to analyse methods and goals of the East German civil and military intelligence services on this field in more detail. The article summarises the state of research on staff and sources of these services. Based on this information, main directions and operational fields are exemplified for military and international strategic intelligence in the era of d tente of the 1970s. Contents and quality of intelligence results are focused with respect to their potential influence on East German and Warsaw Pact (i.e. Soviet) decision-making processes.
|
|
|
|
|
|
|
|
|
|
14 |
ID:
134433
|
|
|
Publication |
Stanford, Stanford University Press, 2014.
|
Description |
241p.Pbk
|
Contents |
Includes bibliographical references and index
|
Standard Number |
9780804792653
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
057935 | 327.12/TUC 057935 | Main | On Shelf | General | |
|
|
|
|
15 |
ID:
038196
|
|
|
Publication |
London, Luscompe, 1976.
|
Description |
157p.
|
Standard Number |
0860020819
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
015911 | 327.12/GEL 015911 | Main | On Shelf | General | |
|
|
|
|
16 |
ID:
032358
|
|
|
Publication |
London, Hutchinson and Co Ltd, 1967.
|
Description |
xvii, 230p
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
000843 | 331.894/HAM 000843 | Main | On Shelf | General | |
|
|
|
|
17 |
ID:
146570
|
|
|
18 |
ID:
016755
|
|
|
Publication |
March 7, 1994.
|
Description |
28-34
|
|
|
|
|
|
|
|
|
|
19 |
ID:
151106
|
|
|
Summary/Abstract |
This essay argues that treason by means of espionage is ethically justified when six factors are present, two of which are: that the political community being betrayed fails to secure for its citizens basic human rights and other means of peaceful or otherwise lawful protest are unavailable. The paper begins by analyzing the application of several theories of ethics to treason, including: consequentialism, deontology, the Just War tradition, and Michael Walzer’s influential concept of ‘dirty hands.’ It then criticizes these points of view and offers an account of jus ad proditione per intelligentia (just treason by means of espionage) based upon Aristotelian thinking about ethics and politics.
|
|
|
|
|
|
|
|
|
|
20 |
ID:
026683
|
|
|
Publication |
New Delhi, Vikas Publishing, 1981.
|
Description |
403p.
|
Standard Number |
0706913442
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
019228 | 327.12/COL 019228 | Main | On Shelf | General | |
|
|
|
|
|
|
|
|
|