Cyber war is coming," announced a land-mark RAND report in 1993. In 2005, the U.S. Air Force boasted it would now fly, fight, and win in cyberspace, the "fifth domain" of warfare. This book takes stock, twenty years on: is cyber war really coming? Has war indeed entered the fifth domain? Cyber War Will Not Take Place cuts through the hype and takes a fresh look at cyber security. Thomas Rid argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways. The threat consists of three different vectors: espionage, sabotage, and subversion. The author traces the most significant hacks and attacks, exploring the full spectrum of case studies from the shadowy world of computer espionage and weaponised code. With a mix of technical detail and rigorous political analysis, the book explores some key questions: What are cyber weapons? How have they changed the meaning of violence? How likely and how dangerous is crowd-sourced subversive activity? Why has there never been a lethal cyber attack against a country's critical infrastructure? How serious is the threat of "pure" cyber espionage, of exfiltrating data without infiltrating humans first? And who is most vulnerable: which countries, industries, individuals?
The interplay of artificial intelligence and software engineering has been an interesting and an active area in research institution and industry. This book covers the state of the art in the use of knowledge-based approaches for software specification, design, implementation, testing and debugging. Starting with an introduction to various software engineering paradigms and knowledge-based software systems, the book continues with the discussion of using hybrid knowledge representation as a basis to specify software requirements, to facilitate specification analysis and transformation of real-time distributed software systems. A formal requirements specification language using non-monotonic logic, temporal logic, frames and production systems for new software engineering paradigms (such as rapid prototyping, operational specification and transformational implementation) is also discussed in detail. Examples from switching and other applications are used to illustrate the requirements language. Finally, the development, specification and verification of knowledge-based systems are investigated.
The Invisible Religion is a modern classic of social science. Its influence goes well beyond sociology as it continues to inspire research in such diverse fields as sociology of knowledge, ethnology, theology, sociology of religion, and religious studies. In this volume, the author endeavours to answer one of the most important questions regarding religion in modern times: Are Western societies indeed becoming more secular as they modernize? His surprising answer is still part of the ongoing debates about secularization as he argues that rather than a decline of religion, we are witnessing a shift from an older Church-centered form, to another invisible and still largely unexplored form of religion. Explaining why focusing only on Church when discussing religion is inadequate, this book presents a thorough case for reframing the question of the status of religion in modern life in a way that makes visible forms of religion hitherto unseen, and sketches some aspects of this new form. As such, it will appeal to sociologists with interests in social theory, religion, and the secularization thesis.
This book sets out a generative structuralist conception of general theoretical sociology; its philosophy, its problems, and its methods. The field is defined as a comprehensive research tradition with many intersecting subtraditions that share conceptual components.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.