The Sources of Military Doctrine

The Sources of Military Doctrine

Author: Barry Posen

Publisher: Cornell University Press

Published: 1984

Total Pages: 292

ISBN-13: 9780801494277

DOWNLOAD EBOOK

Barry R. Posen explores how military doctrine takes shape and the role it plays in grand strategy-that collection of military, economic, and political means and ends with which a state attempts to achieve security. Posen isolates three crucial elements of a given strategic doctrine: its offensive, defensive, or deterrent characteristics, its integration of military resources with political aims, and the degree of military or operational innovation it contains. He then examines these components of doctrine from the perspectives of organization theory and balance of power theory, taking into account the influence of technology and geography. Looking at interwar France, Britain, and Germany, Posen challenges each theory to explain the German Blitzkrieg, the British air defense system, and the French Army's defensive doctrine often associated with the Maginot Line. This rigorous comparative study, in which the balance of power theory emerges as the more useful, not only allows us to discover important implications for the study of national strategy today, but also serves to sharpen our understanding of the origins of World War II.


The Cybersecurity Dilemma

The Cybersecurity Dilemma

Author: Ben Buchanan

Publisher: Oxford University Press

Published: 2017-02-01

Total Pages: 300

ISBN-13: 0190694807

DOWNLOAD EBOOK

Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.


The Sources of Military Doctrine

The Sources of Military Doctrine

Author: Barry R. Posen

Publisher: Cornell University Press

Published: 2014-09-10

Total Pages: 292

ISBN-13: 0801468574

DOWNLOAD EBOOK

Barry R. Posen explores how military doctrine takes shape and the role it plays in grand strategy-that collection of military, economic, and political means and ends with which a state attempts to achieve security. Posen isolates three crucial elements of a given strategic doctrine: its offensive, defensive, or deterrent characteristics, its integration of military resources with political aims, and the degree of military or operational innovation it contains. He then examines these components of doctrine from the perspectives of organization theory and balance of power theory, taking into account the influence of technology and geography. Looking at interwar France, Britain, and Germany, Posen challenges each theory to explain the German Blitzkrieg, the British air defense system, and the French Army's defensive doctrine often associated with the Maginot Line. This rigorous comparative study, in which the balance of power theory emerges as the more useful, not only allows us to discover important implications for the study of national strategy today, but also serves to sharpen our understanding of the origins of World War II.


Cyber Arms

Cyber Arms

Author: Stanislav Abaimov

Publisher: CRC Press

Published: 2020-07-02

Total Pages: 162

ISBN-13: 1000081176

DOWNLOAD EBOOK

This book will raise awareness on emerging challenges of AIempowered cyber arms used in weapon systems and stockpiled in the global cyber arms race. Based on real life events, it provides a comprehensive analysis of cyber offensive and defensive landscape, analyses the cyber arms evolution from prank malicious codes into lethal weapons of mass destruction, reveals the scale of cyber offensive conflicts, explores cyber warfare mutation, warns about cyber arms race escalation and use of Artificial Intelligence (AI) for military purposes. It provides an expert insight into the current and future malicious and destructive use of the evolved cyber arms, AI and robotics, with emphasis on cyber threats to CBRNe and critical infrastructure. The book highlights international efforts in regulating the cyber environment, reviews the best practices of the leading cyber powers and their controversial approaches, recommends responsible state behaviour. It also proposes information security and cyber defence solutions and provides definitions for selected conflicting cyber terms. The disruptive potential of cyber tools merging with military weapons is examined from the technical point of view, as well as legal, ethical, and political perspectives.