The Plan We Need for Security, Peace, and Justice:Problems the Patriarch Job Had, Advice Job Needed, Solutions the Apostle Paul Had, The Plan We Need George Skoglund
Post-conflict Security, Peace and Development:Perspectives from Africa, Latin America, Europe and New Zealand. 1st ed. 2019
The Plan We Need for Security, Peace, and Justice:Problems the Patriarch Job Had, Advice Job Needed, Solutions the Apostle Paul Had, the Plan We Need George Skoglund
SECURITY AND PEACE: J. Isawa Elaigwu
Post-conflict Security, Peace and Development:Perspectives from Africa, Latin America, Europe and New Zealand SpringerBriefs in Environment, Security, Development and Peace. 1st ed. 2019
This book offers an introduction to Information Technology with regard to peace, conflict, and security research, a topic that it approaches from natural science, technical and computer science perspectives. Following an initial review of the fundamental roles of IT in connection with peace, conflict and security, the contributing authors address the rise of cyber conflicts via information warfare, cyber espionage, cyber defence and Darknets. The book subsequently explores recent examples of cyber warfare, including: - The Stuxnet attack on Iran´s uranium refining capability - The hacking of the German Federal Parliament´s internal communication system - The Wannacry malware campaign, which used software stolen from a US security agency to launch ransomware attacks worldwide The book then introduces readers to the concept of cyber peace, including a discussion of confidence and security-building measures. A section on Cyber Arms Control draws comparisons to global efforts to control chemical warfare, to reduce the risk of nuclear war, and to prevent the militarization of space. Additional topics include the security of critical information infrastructures, and cultural violence and peace in social media. The book concludes with an outlook on the future role of IT in peace and security. Information Technology for Peace and Security breaks new ground in a largely unexplored field of study, and offers a valuable asset for a broad readership including students, educators and working professionals in computer science, IT security, peace and conflict studies, and political science.