skip to content

Knake, Robert K.

Overview
Works: 18 works in 65 publications in 10 languages and 3,480 library holdings
Roles: Author
Publication Timeline
Key
Publications about Robert K Knake
Publications by Robert K Knake
Most widely held works by Robert K Knake
Cyber war : the next threat to national security and what to do about it by Richard A Clarke( Book )
21 editions published between 2010 and 2012 in English and Arabic and held by 1,764 libraries worldwide
Security expert Richard A. Clarke goes beyond "geek talk" to succinctly explain how cyber weapons work and how vulnerable America is to the new world of nearly untraceable cyber criminals and spies. This sobering story of technology, government, and military strategy involving criminals, spies, soldiers, and hackers begins the much needed public policy debate about what America's doctrine and strategy should be, not just for waging, but for preventing the First Cyber War
Internet governance in an age of cyber insecurity by Robert K Knake( Book )
9 editions published between 2010 and 2011 in English and Arabic and held by 100 libraries worldwide
The Internet, since its debut in 1989, has revolutionized commerce, communication, military action, and governance. Much of the modern world is simply inconceivable without it. This revolution, however, has not come without a price. The annual cost of cyber crime has now climbed to more than $1 trillion, while coordinated cyberattacks have crippled Estonia, Georgia, and Kyrgyzstan and compromised critical infrastructure in countries around the world. While no fewer than six UN bodies and multiple regional and national forums have sought to build a consensus on the future of Internet governance, there has been little progress thus far. The United States has largely abstained from these discussions, instead focusing on developing its own offensive and defensive cybersecurity capabilities while entrusting the ongoing stability of the system to the expertise of the private sector. In this Council Special Report, Robert K. Knake briefly examines the technological decisions that have enabled both the Internet's spectacular success and its troubling vulnerability to attack. Arguing that the United States can no longer cede the initiative on cyber issues to countries that do not share its interests, he outlines an agenda that the United States can pursue in concert with its allies on the international stage. This agenda, addressing cyber warfare, cyber crime, and state-sponsored espionage, should, he writes, be pursued through both technological and legal means. He urges first that the United States empower experts to confront the fundamental security issues at the heart of the Internet's design. Then he sketches the legal tools necessary to address both cyber crime and state-sponsored activities, including national prohibitions of cyber crime, multilateral mechanisms to prevent and prosecute cyberattacks, and peacetime norms protecting critical civilian systems, before describing the bureaucratic reforms the United States should make to implement effectively these changes
Cyber war : the next threat to national security and what to do about it by Richard A Clarke( Sound Recording )
7 editions published in 2014 in English and held by 88 libraries worldwide
Former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America's vulnerability in a terrifying new international conflict
World Wide War : Angriff aus dem Internet by Richard A Clarke( Book )
7 editions published between 2011 and 2012 in 3 languages and held by 46 libraries worldwide
Richard A. Clarke, Amerikas Sicherheitsexperte Nummer eins warnt: Das World Wide Web ist nicht nur ein Segen, sondern auch eine Quelle neuer Gefahren, gegen die effektive Schutzmassnahmen ergriffen werden müssen
Cyber war : what it is and how to fight it by Richard A Clarke( Book )
1 edition published in 2010 in English and held by 28 libraries worldwide
Guerra en la red : los nuevos campos de batalla by Richard A Clarke( Book )
6 editions published between 2011 and 2012 in 3 languages and held by 20 libraries worldwide
Securing the GCC in cyberspace by Richard A Clarke( Book )
2 editions published in 2010 in English and held by 7 libraries worldwide
"This paper considers what such a safe cyber zone might comprise. It begins by assessing the risks posed to the GCC in cyberspace, including an assessment of threats from regional actors' cyber warfare capabilities and the vulnerabilities these actors could exploit, and a discussion of the potential consequences if these actors were to successfully target vulnerabilities with the GCC. It then lays out a roadmap for turning the GCC into a safe cyber zone."--Page 3
Ḥarb al-faḍā al-iIiktrūnī : Al-Tahdīd al-tālī lil-aman al-qawmī wa kayfīyat al-taʻāmul maʻahu by Richard A Clarke( Book )
1 edition published in 2012 in Arabic and held by 4 libraries worldwide
Wang lu zhan zheng : xia yi ge guo an wei xie ji yin ying zhi dao by Richard A Clarke( Book )
2 editions published in 2014 in Chinese and held by 3 libraries worldwide
Ḥimāyat al-faḍāʼ al-iliktrūnī fī duwal majlis al-taʻāwun li-duwal al-khalīj al-ʻarabīyah by Richard A Clarke( Book )
1 edition published in 2011 in Arabic and held by 2 libraries worldwide
Siber savaş : ulusal güvenliğe yönelik yeni tehdit by Richard A Clarke( Book )
1 edition published in 2011 in Turkish and held by 1 library worldwide
<> ( Book )
1 edition published in 2013 in Korean and held by 1 library worldwide
Ḥimāyat al-faḍāʼ al-iliktrūnī fī duwal Majlis al-Taʻāwun li-Duwal al-Khalīj al-ʻArabī by Richard A Clarke( Book )
1 edition published in 2011 in Arabic and held by 1 library worldwide
CTC Sentinel. Volume 1, Issue 3, Feb 2008. Counter-Terrorism Issues for the Next President ( Book )
1 edition published in 2008 in English and held by 1 library worldwide
The next president will inherit from the current administration a dysfunctional counter-terrorism apparatus. The U.S. military has been stretched thin by the wars in Iraq and Afghanistan, the intelligence community has been discredited by the lack of weapons of mass destruction in Iraq and the ongoing failed hunt for Usama bin Ladin, and the Department of Homeland Security has so many missions and so many disparate agencies that it is ineffective. An even more challenging task will be to restore to the United States credibility in the world and to reduce the number of people who bear us ill will. Every new president has about a year when they can better achieve goals and changes because of their fresh mandate from the people. Without a clear agenda, however, the first year can be easily squandered and political capital spent on other, less important matters. In an effort to prevent this from occurring, the authors propose a three-part framework for combating terrorism that involves drying up support for terrorism, improving our intelligence capabilities and rethinking our approach to homeland security
Internet Governance in an Age of Cyber Insecurity (Council Special Report) by Council on Foreign Relations( Book )
1 edition published in 2010 in Undetermined and held by 1 library worldwide
Making Homeland Security pay dividends : correcting the market failure in private sector security by Melody Flowers( Book )
1 edition published in 2005 in English and held by 1 library worldwide
A Cyberattack on the U.S. Power Grid by Robert K Knake( Book )
1 edition published in 2017 in English and held by 1 library worldwide
Government's role in vulnerability disclosure : creating a permanent and accountable vulnerability equities process by Ari Schwartz( file )
1 edition published in 2016 in English and held by 0 libraries worldwide
When government agencies discover or purchase zero day vulnerabilities, they confront a dilemma: should the government disclose such vulnerabilities, and thus allow them to be fixed, or should the government retain them for national security purposes? It is a difficult question because the government is simultaneously charged with protecting the nation in cyberspace and with intelligence, law enforcement, and military missions that may require the use of such vulnerabilities. A decision by the government to retain a zero day vulnerability likely undercuts general cybersecurity, while disclosing information about a zero day vulnerability so vendors can patch it could undercut the ability of law enforcement to investigate crimes, intelligence agencies to gather intelligence, and the military to carry out offensive cyber operations. A debate over this issue is complex. Public and offcial release of information about the process with clear oversight would increase public confidence in the program, and in the government's commitment to the core principles laid out by Administration to date, and could become a model for other nations around the world
 
moreShow More Titles
fewerShow Fewer Titles
Alternative Names
Knake, Rob
Knake, Robert K.
روبرت كنيك
نيك، روبرت
네이크, 로버트
ネイク, ロバート
Languages
English (42)
Arabic (5)
Chinese (4)
German (3)
Spanish (3)
Japanese (2)
Thai (2)
Turkish (1)
Russian (1)
Korean (1)
Covers
Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.