R&L Logo R&L Logo
  • GENERAL
    • Browse by Subjects
    • New Releases
    • Coming Soon
    • Chases's Calendar
  • ACADEMIC
    • Textbooks
    • Browse by Course
    • Instructor's Copies
    • Monographs & Research
    • Reference
  • PROFESSIONAL
    • Education
    • Intelligence & Security
    • Library Services
    • Business & Leadership
    • Museum Studies
    • Music
    • Pastoral Resources
    • Psychotherapy
  • FREUD SET
Cover Image
Hardback
Paperback
eBook
share of facebook share on twitter
Add to GoodReads

Understanding Cybersecurity

Emerging Governance and Strategy

Edited by Gary Schaub, Jr.

Over the last decade, the internet and cyber space has had a phenomenal impact on all parts of society, from media and politics to defense and war. Governments around the globe have started to develop cyber security strategies, governance and operations to consider cyberspace as an increasingly important and contentious international issue. This book provides the reader with the most up-to-date survey of the cyberspace security practices and processes in two accessible parts; governance and operations. Suitable for a wide-ranging audience, from professionals, analysts, military personnel, policy-makers and academics, this collection offers all sides of cyberspace issues, implementation and strategy for the future.

Gary Schaub is also the co-editor of “Private Military and Security Contractors” (2016), click link for full details: https://rowman.com/ISBN/9781442260214/Private-Military-and-Security-Contractors-Controlling-the-Corporate-Warrior
  • Details
  • Details
  • Author
  • Author
  • TOC
  • TOC
  • Reviews
  • Reviews
Rowman & Littlefield Publishers / Rowman & Littlefield International
Pages: 286 • Trim: 6¼ x 9⅜
978-1-78660-679-2 • Hardback • February 2018 • $153.00 • (£119.00)
978-1-78660-680-8 • Paperback • January 2018 • $54.00 • (£42.00)
978-1-78660-681-5 • eBook • January 2018 • $51.00 • (£39.00)
Subjects: Political Science / Security (National & International), Political Science / Censorship, Political Science / Intelligence & Espionage
Gary Schaub, Jr. is a Senior Researcher at the Centre for Military Studies, Department of Political Science, the University of Copenhagen.
Preface, W. Michael Guillot / The Future of Things Cyber, Michael V. Hayden / 1. Internet Governance and National Security, Panayotis A. Yannakogeorgos / 2. Managing Decentralized Cyber Governance, Mark Raymond / 3. Tragedy of the Cyber Commons? Roger Hurwitz and Gary Schaub Jr. / 4. Rise of a Cybered Westphalian Age 2.0, Chris C. Demchak and Peter Dombrowski / 5. Blown to Bits: China’s War in Cyberspace, August-September 2025, Christopher Bronk / 6. Nuclear Lessons for Cybersecurity? Joseph S. Nye Jr. / 7. Escalation Dynamics and Conflict Termination in Cyberspace, Herbert Lyn Jr. / 8. Specter of Non-Obvious Warfare, Martin C. Libicki / 9. Act and Actor Attribution in Cyberspace, Eric F. Mejia / 10. Strengthening Private-Public Partnerships in National Cybersecurity, James P. Farwell / Bibliography / Notes on the Contributors / Index
Recommended: A compilation of updated articles sourced from the US Air Force journal Strategic Studies Quarterly, this volume looks at cyberspace from a governmental and military standpoint, focusing on defense planning and strategy. Schaub (Univ. of Copenhagen) has edited a cohesive monograph on the topic, and contributors include an authoritative combination of academics and industry experts. While officially divided into two complementary sections, governance and operations, Understanding Cybersecurity seamlessly delves first into the philosophical issues of governing a realm “bound only by the limits of human innovation” (p. 3), then looks at the logistical issues of governance, and finally discusses defense and operational strategy. With cyberspace now considered the “fifth domain” of security operations by the US Department of Defense, it stands to reason that the largest portion of this monograph presents a militaristic view of managing cyber conflict and planning for cyber warfare. While many current works approach cybersecurity from an information technology perspective, this work provides a needed academic primer on the philosophy and logistics behind how governmental agencies are creating policy in regards to cybersecurity and securing infrastructures against cyber threats.
— Choice Reviews


Does the US mature cyber as a strategic capability and become a world class player in this domain or cede the field to opponents and perpetually react to their actions? Gaining cyber dominance will be a long and arduous journey. The substantial gap between capability and policy will impede our rate of progress. A first step to narrow this critical gap and accelerate our journey is to read this volume, internalize the key challenges and broaden the debate across the policy, legal, privacy, information technology, military and intelligence sectors.


— James Gosler, Senior Fellow, Johns Hopkins University


This compact volume includes some of the best scholarship in the field, providing a deeper understanding of the dynamics of cyberspace and cyberwar. The research and analysis here are essential reading to understand the important cybersecurity challenges facing the United States and the international community today.
— Jason Healey, Senior Fellow for the Cyber Statecraft Initiative of the Atlantic Council and Senior Research Scholar at Columbia University's School of International and Public Affairs


Long acknowledged as the fifth domain of military operations, cyberspace remains the least understood - a "place" where daily skirmishes involve nation-states, private corporations, and individuals on territory lacking the boundaries, rules, and doctrine that delimit the counterpart domains of air, space, land, and sea. The hard and necessary work of maturing cyber doctrine and practice will be built upon the careful scholarship such as that found in this volume - a must read for any who will operate in cyberspace, and all who will depend on their success.
— Chris Inglis, Former Deputy Director of the National Security Agency




Schaub (Univ. of Copenhagen) has edited a cohesive monograph on the topic, and contributors include an authoritative combination of academics and industry experts.



this work provides a needed academic primer on the philosophy and logistics behind how governmental agencies are creating policy in regards to cybersecurity and securing infrastructures against cyber threats.





Summing Up: Recommended. Advanced undergraduates through faculty and professionals.





Readership Level: Upper-division Undergraduates, Graduate Students, Researchers/Faculty, Professionals/Practitioners
— Choice Reviews, vol 9


Understanding Cybersecurity

Emerging Governance and Strategy

Cover Image
Hardback
Paperback
eBook
Summary
Summary
  • Over the last decade, the internet and cyber space has had a phenomenal impact on all parts of society, from media and politics to defense and war. Governments around the globe have started to develop cyber security strategies, governance and operations to consider cyberspace as an increasingly important and contentious international issue. This book provides the reader with the most up-to-date survey of the cyberspace security practices and processes in two accessible parts; governance and operations. Suitable for a wide-ranging audience, from professionals, analysts, military personnel, policy-makers and academics, this collection offers all sides of cyberspace issues, implementation and strategy for the future.

    Gary Schaub is also the co-editor of “Private Military and Security Contractors” (2016), click link for full details: https://rowman.com/ISBN/9781442260214/Private-Military-and-Security-Contractors-Controlling-the-Corporate-Warrior
Details
Details
  • Rowman & Littlefield Publishers / Rowman & Littlefield International
    Pages: 286 • Trim: 6¼ x 9⅜
    978-1-78660-679-2 • Hardback • February 2018 • $153.00 • (£119.00)
    978-1-78660-680-8 • Paperback • January 2018 • $54.00 • (£42.00)
    978-1-78660-681-5 • eBook • January 2018 • $51.00 • (£39.00)
    Subjects: Political Science / Security (National & International), Political Science / Censorship, Political Science / Intelligence & Espionage
Author
Author
  • Gary Schaub, Jr. is a Senior Researcher at the Centre for Military Studies, Department of Political Science, the University of Copenhagen.
Table of Contents
Table of Contents
  • Preface, W. Michael Guillot / The Future of Things Cyber, Michael V. Hayden / 1. Internet Governance and National Security, Panayotis A. Yannakogeorgos / 2. Managing Decentralized Cyber Governance, Mark Raymond / 3. Tragedy of the Cyber Commons? Roger Hurwitz and Gary Schaub Jr. / 4. Rise of a Cybered Westphalian Age 2.0, Chris C. Demchak and Peter Dombrowski / 5. Blown to Bits: China’s War in Cyberspace, August-September 2025, Christopher Bronk / 6. Nuclear Lessons for Cybersecurity? Joseph S. Nye Jr. / 7. Escalation Dynamics and Conflict Termination in Cyberspace, Herbert Lyn Jr. / 8. Specter of Non-Obvious Warfare, Martin C. Libicki / 9. Act and Actor Attribution in Cyberspace, Eric F. Mejia / 10. Strengthening Private-Public Partnerships in National Cybersecurity, James P. Farwell / Bibliography / Notes on the Contributors / Index
Reviews
Reviews
  • Recommended: A compilation of updated articles sourced from the US Air Force journal Strategic Studies Quarterly, this volume looks at cyberspace from a governmental and military standpoint, focusing on defense planning and strategy. Schaub (Univ. of Copenhagen) has edited a cohesive monograph on the topic, and contributors include an authoritative combination of academics and industry experts. While officially divided into two complementary sections, governance and operations, Understanding Cybersecurity seamlessly delves first into the philosophical issues of governing a realm “bound only by the limits of human innovation” (p. 3), then looks at the logistical issues of governance, and finally discusses defense and operational strategy. With cyberspace now considered the “fifth domain” of security operations by the US Department of Defense, it stands to reason that the largest portion of this monograph presents a militaristic view of managing cyber conflict and planning for cyber warfare. While many current works approach cybersecurity from an information technology perspective, this work provides a needed academic primer on the philosophy and logistics behind how governmental agencies are creating policy in regards to cybersecurity and securing infrastructures against cyber threats.
    — Choice Reviews


    Does the US mature cyber as a strategic capability and become a world class player in this domain or cede the field to opponents and perpetually react to their actions? Gaining cyber dominance will be a long and arduous journey. The substantial gap between capability and policy will impede our rate of progress. A first step to narrow this critical gap and accelerate our journey is to read this volume, internalize the key challenges and broaden the debate across the policy, legal, privacy, information technology, military and intelligence sectors.


    — James Gosler, Senior Fellow, Johns Hopkins University


    This compact volume includes some of the best scholarship in the field, providing a deeper understanding of the dynamics of cyberspace and cyberwar. The research and analysis here are essential reading to understand the important cybersecurity challenges facing the United States and the international community today.
    — Jason Healey, Senior Fellow for the Cyber Statecraft Initiative of the Atlantic Council and Senior Research Scholar at Columbia University's School of International and Public Affairs


    Long acknowledged as the fifth domain of military operations, cyberspace remains the least understood - a "place" where daily skirmishes involve nation-states, private corporations, and individuals on territory lacking the boundaries, rules, and doctrine that delimit the counterpart domains of air, space, land, and sea. The hard and necessary work of maturing cyber doctrine and practice will be built upon the careful scholarship such as that found in this volume - a must read for any who will operate in cyberspace, and all who will depend on their success.
    — Chris Inglis, Former Deputy Director of the National Security Agency




    Schaub (Univ. of Copenhagen) has edited a cohesive monograph on the topic, and contributors include an authoritative combination of academics and industry experts.



    this work provides a needed academic primer on the philosophy and logistics behind how governmental agencies are creating policy in regards to cybersecurity and securing infrastructures against cyber threats.





    Summing Up: Recommended. Advanced undergraduates through faculty and professionals.





    Readership Level: Upper-division Undergraduates, Graduate Students, Researchers/Faculty, Professionals/Practitioners
    — Choice Reviews, vol 9


ALSO AVAILABLE

  • Cover image for the book Communicating with Intelligence: Writing and Briefing for National Security, Third Edition
  • Cover image for the book Counterintelligence Theory and Practice, Second Edition
  • Cover image for the book Human Security: Theory and Action, Second Edition
  • Cover image for the book Dr. Seuss and the Art of War: Secret Military Lessons
  • Cover image for the book The Handbook of Cross-Border Ethnic and Religious Affinities
  • Cover image for the book Constructive Conflicts: From Emergence to Transformation, Sixth Edition
  • Cover image for the book North Korea, Nuclear Risk-Taking, and the United States: Kim Il Sung, Kim Jong Il, and Kim Jong Un
  • Cover image for the book Introduction to Conflict Resolution: Discourses and Dynamics
  • Cover image for the book What Do We Know about Civil Wars?, Second Edition
  • Cover image for the book Food Supply Protection and Homeland Security, Second Edition
  • Cover image for the book Terrorist Organizations and Weapons of Mass Destruction: U.S. Threats, Responses, and Policies
  • Cover image for the book The Handbook of African Intelligence Cultures
  • Cover image for the book Nuclear Weapons and American Grand Strategy
  • Cover image for the book The Indian Ocean Region: A Strategic Net Assessment
  • Cover image for the book Money for Mayhem: Mercenaries, Private Military Companies, Drones, and the Future of War
  • Cover image for the book The Centaur's Dilemma: National Security Law for the Coming AI Revolution
  • Cover image for the book Truth and Reconciliation Commission Processes: Learning from the Solomon Islands
  • Cover image for the book The Handbook of Asian Intelligence Cultures
  • Cover image for the book American National Security Policy: Authorities, Institutions, and Cases
  • Cover image for the book Hybridity, Conflict, and the Global Politics of Cybersecurity
  • Cover image for the book Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets
  • Cover image for the book Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
  • Cover image for the book The Use of Force: Military Power and International Politics, Eighth Edition
  • Cover image for the book Energy Infrastructure Protection and Homeland Security, Second Edition
  • Cover image for the book U.S. Department of Defense Contract Spending and the Industrial Base, 2000-2013
  • Cover image for the book Strategic Cyber Deterrence: The Active Cyber Defense Option
  • Cover image for the book Overcoming Intractable Conflicts: New Approaches to Constructive Transformations
  • Cover image for the book Security Studies: Classic to Post-Modern Approaches
  • Cover image for the book The Future of National Intelligence: How Emerging Technologies Reshape Intelligence Communities
  • Cover image for the book National, International, and Human Security: Protection against Violence, Third Edition
  • Cover image for the book Asia’s Trouble Spots: The Leadership Question in Conflict Resolution
  • Cover image for the book Rebuilding the Arsenal of Democracy: The U.S. and Chinese Defense Industrial Bases in an Era of Great Power Competition, CSIS Report
  • Cover image for the book Conflict Intervention and Transformation: Theory and Practice
  • Cover image for the book The Handbook of Latin American and Caribbean Intelligence Cultures
  • Cover image for the book U.S. National Security Law: An International Perspective
  • Cover image for the book The Academic-Practitioner Divide in Intelligence Studies
  • Cover image for the book When Should America Fight?
  • Cover image for the book Communicating with Intelligence: Writing and Briefing for National Security, Third Edition
  • Cover image for the book Counterintelligence Theory and Practice, Second Edition
  • Cover image for the book Human Security: Theory and Action, Second Edition
  • Cover image for the book Dr. Seuss and the Art of War: Secret Military Lessons
  • Cover image for the book The Handbook of Cross-Border Ethnic and Religious Affinities
  • Cover image for the book Constructive Conflicts: From Emergence to Transformation, Sixth Edition
  • Cover image for the book North Korea, Nuclear Risk-Taking, and the United States: Kim Il Sung, Kim Jong Il, and Kim Jong Un
  • Cover image for the book Introduction to Conflict Resolution: Discourses and Dynamics
  • Cover image for the book What Do We Know about Civil Wars?, Second Edition
  • Cover image for the book Food Supply Protection and Homeland Security, Second Edition
  • Cover image for the book Terrorist Organizations and Weapons of Mass Destruction: U.S. Threats, Responses, and Policies
  • Cover image for the book The Handbook of African Intelligence Cultures
  • Cover image for the book Nuclear Weapons and American Grand Strategy
  • Cover image for the book The Indian Ocean Region: A Strategic Net Assessment
  • Cover image for the book Money for Mayhem: Mercenaries, Private Military Companies, Drones, and the Future of War
  • Cover image for the book The Centaur's Dilemma: National Security Law for the Coming AI Revolution
  • Cover image for the book Truth and Reconciliation Commission Processes: Learning from the Solomon Islands
  • Cover image for the book The Handbook of Asian Intelligence Cultures
  • Cover image for the book American National Security Policy: Authorities, Institutions, and Cases
  • Cover image for the book Hybridity, Conflict, and the Global Politics of Cybersecurity
  • Cover image for the book Reasoning for Intelligence Analysts: A Multidimensional Approach of Traits, Techniques, and Targets
  • Cover image for the book Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
  • Cover image for the book The Use of Force: Military Power and International Politics, Eighth Edition
  • Cover image for the book Energy Infrastructure Protection and Homeland Security, Second Edition
  • Cover image for the book U.S. Department of Defense Contract Spending and the Industrial Base, 2000-2013
  • Cover image for the book Strategic Cyber Deterrence: The Active Cyber Defense Option
  • Cover image for the book Overcoming Intractable Conflicts: New Approaches to Constructive Transformations
  • Cover image for the book Security Studies: Classic to Post-Modern Approaches
  • Cover image for the book The Future of National Intelligence: How Emerging Technologies Reshape Intelligence Communities
  • Cover image for the book National, International, and Human Security: Protection against Violence, Third Edition
  • Cover image for the book Asia’s Trouble Spots: The Leadership Question in Conflict Resolution
  • Cover image for the book Rebuilding the Arsenal of Democracy: The U.S. and Chinese Defense Industrial Bases in an Era of Great Power Competition, CSIS Report
  • Cover image for the book Conflict Intervention and Transformation: Theory and Practice
  • Cover image for the book The Handbook of Latin American and Caribbean Intelligence Cultures
  • Cover image for the book U.S. National Security Law: An International Perspective
  • Cover image for the book The Academic-Practitioner Divide in Intelligence Studies
  • Cover image for the book When Should America Fight?
facebook icon twitter icon instagram icon linked in icon NEWSLETTERS
ABOUT US
  • Mission Statement
  • Employment
  • Privacy
  • Accessibility Statement
CONTACT
  • Company Directory
  • Publicity and Media Queries
  • Rights and Permissions
  • Textbook Resource Center
AUTHOR RESOURCES
  • Royalty Contact
  • Production Guidelines
  • Manuscript Submissions
ORDERING INFORMATION
  • Rowman & Littlefield
  • National Book Network
  • Ingram Publisher Services UK
  • Special Sales
  • International Sales
  • eBook Partners
  • Digital Catalogs
IMPRINTS
  • Rowman & Littlefield
  • Lexington Books
  • Hamilton Books
  • Applause Books
  • Amadeus Press
  • Backbeat Books
  • Bernan
  • Hal Leonard Books
  • Limelight Editions
  • Co-Publishing Partners
  • Globe Pequot
  • Down East Books
  • Falcon Guides
  • Gooseberry Patch
  • Lyons Press
  • Muddy Boots
  • Pineapple Press
  • TwoDot Books
  • Stackpole Books
PARTNERS
  • American Alliance of Museums
  • American Association for State and Local History
  • Brookings Institution Press
  • Center for Strategic & International Studies
  • Council on Foreign Relations
  • Fairleigh Dickinson University Press
  • Fortress Press
  • The Foundation for Critical Thinking
  • Lehigh University Press
  • United States Holocaust Memorial Museum
  • Other Partners...