Search Results - "nuclear weapons"
Suggested Topics within your search.
Suggested Topics within your search.
- Nuclear weapons 240
- Government policy 78
- Nuclear arms control 76
- Military policy 72
- History 64
- Foreign relations 62
- Nuclear nonproliferation 62
- Testing 32
- Security, International 30
- National security 28
- Nuclear warfare 28
- Politics and government 26
- Nuclear disarmament 22
- World politics 22
- Armed Forces 18
- Deterrence (Strategy) 18
- Nuclear energy 16
- Research 16
- Appropriations and expenditures 14
- Detection 14
- Economic indicators 14
- Political aspects 14
- Quality of life 14
- Social indicators 14
- Health status indicators 12
- Safety measures 12
- Strategic aspects 12
- Arms control 10
- Arms race 10
- Environmental aspects 10
-
341
Crisis and escalation in cyberspace /
Published 2012Table of Contents: “…-- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook -
342
Crisis and escalation in cyberspace /
Published 2012Table of Contents: “…-- Escalation risks -- Escalation risks in phase -- Escalation risks for contained local conflicts -- Escalation risks for uncontained conflicts -- Managing proxy cyberattacks -- What hidden combatants imply for horizontal escalation -- Managing overt proxy conflict -- The difficulties of tit-for-tat management -- The importance of pre-planning -- Disjunctions among effort, effect, and perception -- Inadvertent escalation -- Escalation into kinetic warfare -- Escalation into economic warfare -- Sub rosa escalation -- Managing the third-party problem -- The need for a clean shot -- Inference and narrative -- Command and control -- Commanders -- Those they command -- Conclusions -- Implications for strategic stability -- Translating sources of cold war instability to cyberspace -- What influence can cyberwar have if nuclear weapons exist? -- Can cyberwar disarm another state's nuclear capabilities? …”
An electronic book accessible through the World Wide Web; click to view
Electronic eBook