Rutgers University Press, 2021. — 192 p. Cyberwars in the Middle East argues that hacking is a form of online political disruption whose influence flows vertically in two directions (top-bottom or bottom-up) or horizontally. These hacking activities are performed along three political dimensions: international, regional, and local. Author Ahmed Al-Rawi argues that political...
2nd edition. — New York: Syngress, 2013. — 325 p. Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out...
Syngress, 2011. — 321 p. Cyber Warfare takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and...
Polity Press, 2021. — 192 p. New technologies are changing how we protect our citizens and wage our wars. Among militaries, everything taken for granted about the ability to maneuver and fight is now undermined by vulnerability to “weapons of mass disruption”: cutting-edge computer worms, viruses, and invasive robot networks. At home, billions of household appliances and other...
John Wiley & Sons, 2014. — 172 p. — ISBN: 978-1-848216-71-8. In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book...
IT Governance, 2024. — 326 р. — ISBN-13: 978-1787785199. In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat. This book discusses: Definitions of cyber...
IT Governance, 2024. — 326 р. — ISBN-13: 978-1787785199. In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat. This book discusses: Definitions of cyber...
IT Governance Ltd, 2024. — 315 p. — ISBN 978-1-78778-520-5. In his second book with IT Governance Publishing, Richard Bingley's Combatting Cyber Terrorism - A guide to understanding the cyber threat landscape and incident response planning analyses the evolution of cyber terrorism and what organisations can do to mitigate this threat. This book discusses Definitions of cyber...
Cambridge University Press, 2021. — 248 p. International legal scholars tend to think of their work as the interpretation of rules: the application of a law 'out there' to concrete situations. This book takes a different approach to that scholarship: it views doctrine as a socio-linguistic practice. In other words, this book views legal scholars not as law-appliers, but as...
O’Reilly Media, 2009. - 240 p. - ISBN: 0596802153. Maybe you've heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantage over their adversaries....
O’Reilly Media, 2011. - 316 p. - ISBN: 978-1-449-31004-2 (Second Edition) Inside Cyber Warfare, обновленное второе издание, в комплексе подробно рассматривает ситуацию в области киберпространства. Вы узнаете, как: хакеры, работающие от имени государства или организованной преступности, играют игры с высокими ставками, которые могут быть ориентированы на любого пользователя...
3rd Edition. — O’Reilly Media, 2024. — 158 p. — ISBN: 978-1-098-13851-6. Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that...
3rd Edition. — O’Reilly Media, 2024. — 158 p. — ISBN: 978-1-098-13851-6. Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that...
3rd Edition. — O’Reilly Media, 2024. — 158 p. — ISBN: 978-1-098-13851-6. Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that...
3rd Edition. — O’Reilly Media, 2024. — 158 p. — ISBN: 978-1-098-13851-6. Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that...
Second Edition. — O’Reilly Media, 2012. — 314 p. When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare―without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly...
Jones and Bartlett Learning, 2021. — 778 p. Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefield of cyberspace! It reviews the role that cyberwarfare plays in modern military operations -- operations in which it has become almost impossible to separate cyberwarfare from traditional warfare. Part 1 discusses the history of...
Packt Publishing, 2020. — 331 p. — ISBN: 978-1-83921-699-2. Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference...
Packt Publishing, 2020. — 248 p. — ISBN: 978-1-83921-699-2. Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference...
Packt Publishing, 2020. — 248 p. — ISBN: 978-1-83921-699-2. Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference...
Packt Publishing, 2020. — 248 p. — ISBN: 978-1-83921-699-2. Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference...
Scanned, 2023. — 257 р. — ISBN: B0CQR2N11Q. Cyber espionage is a type of cyber attack that involves stealing classified, sensitive data or intellectual property to gain an advantage over a competitive company or government entity. It is a form of espionage that has moved into the cyber world, where armies of hackers from around the world use cyber warfare for economic,...
New York: Nova Science Publishers, 2019. — 399 p. A variety of modern research methods in a number of innovating cyber-security techniques and information management technologies are provided in this book along with new related mathematical developments and support applications from engineering. This allows for the exploration of new approaches, useful practices and related...
Rowman and Littlefield, 2021. — 192 p. Cyberwarfare, like the seismic shift of policy with nuclear warfare, is modifying warfare into non-war warfare. A few distinctive characteristics of cyberwar emerge. Cyberwarfare has blurred the distinction between adversary and ally. Cyber probes continuously occur between allies and enemies alike, causing cyberespionage to merge with...
No Starch Press, 2022. — 241 p. — ISBN-13: 978-1-17185-0215-4. A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states. Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This...
No Starch Press, 2022. — 241 p. — ISBN-13: 978-1-17185-0215-4. A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states. Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This...
No Starch Press, 2022. — 241 p. — ISBN-13: 978-1-17185-0215-4. A practical guide to understanding and analyzing cyber attacks by advanced attackers, such as nation states. Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This...
No Starch Press, 2022 — 241 p. — ISBN: 1718502141 Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process...
No Starch Press, 2022 — 241 p. Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their...
Cambridge University Press, 2012. — 359 p. The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyberwar and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states...
Cambridge University Press, 2014. — 360 p. The information revolution has transformed both modern societies and the way in which they conduct warfare. Cyberwar and the Laws of War analyses the status of computer network attacks in international law and examines their treatment under the laws of armed conflict. The first part of the book deals with the resort to force by states...
Boca Raton: CRC Press, 2023. — 202 p. Nowadays in cyberspace, there is a burst of information to which everyone has access. However, apart from the advantages the internet offers, it also hides numerous dangers for both people and nations. Cyberspace has a dark side, including terrorism, bullying, and other types of violence. Cyberwarfare is a kind of virtual war that causes...
Lexington Books, 2017. — 216 p. The turn of the century was accompanied by two historically significant phenomena. One was the emergence of computer networks as a vital component of advanced militaries and interdependent global economic systems. The second concerned China’s rise on the global stage through economic reforms that led to sustained growth and military...
Routledge, 2015. — 196 р. — (Routledge Studies in Conflict, Security and Technology)
This book is a multi-disciplinary analysis of cyber warfare, featuring contributions by leading experts from a mixture of academic and professional backgrounds.
Cyber warfare, meaning interstate cyber aggression, is an increasingly important emerging phenomenon in international relations,...
Apress, 2016. — 244 p. — ISBN10: 1484222288. — ISBN13: 978-1484222287. In today's hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems...
Apress, 2016. — 214 p. — ISBN10: 1484222288. — ISBN13: 978-1484222287. In today's hyper-connected, always-on era of pervasive mobility, cloud computing and intelligent connected devices, virtually every step we take, every transaction we initiate, and every interaction we have are supported in some way by this vast global infrastructure. This set of interconnected systems...
Springer International Publishing,2016. — 266 p. — ISBN: 3319190865 От холодной войны до Кибер войны. This book follows the history of the international law of peace and armed conflict over the last 25 years. It highlights both the parameters that have remained the same over the years as well as the new challenges now facing international law. The articles analyze new...
Springer International Publishing, 2015. — 321 p. This book features a wide spectrum of the latest computer science research relating to cyber warfare, including military and policy dimensions. It is the first book to explore the scientific foundation of cyber warfare and features research from the areas of artificial intelligence, game theory, programming languages, graph...
CRC Press, Taylor & Francis Group, 2015. — 346 p. — ISBN/ASIN: 1482239221 The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt...
Routledge, 2004. — 192 p. As global society becomes more and more dependent, politically and economically, on the flow of information, the power of those who can disrupt and manipulate that flow also increases. In Hacktivism and Cyberwars Tim Jordan and Paul Taylor provide a detailed history of hacktivism's evolution from early hacking culture to its present day status as the...
Simon & Schuster, 2016. — 352 p. “A consistently eye-opening history...not just a page-turner but consistently surprising.” —The New York Times “A book that grips, informs, and alarms, finely researched and lucidly related.” —John le Carré As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming cyber...
Springer, 2024. — 299 p. — ISBN 3658438789. The Art of Cyber Warfare explores the strategic and tactical approaches for offense and defense in the digital age. Drawing on historical conflicts from Sun Tzu to Carl von Clausewitz, the author illustrates that, despite changed conditions such as time, location, means, and resources – but not the laws of physics – it is possible to...
Springer, 2024. – 300 p. – ISBN 978-3-658-43878-4. Искусство кибервойны: стратегические и тактические подходы к нападению и защите в эпоху цифровых технологий The Art of Cyber Warfare explores the strategic and tactical approaches for offense and defense in the digital age. Drawing on historical conflicts from Sun Tzu to Carl von Clausewitz, the author illustrates that, despite...
Springer, 2024. – 300 p. – ISBN 978-3-658-43878-4. Искусство кибервойны: стратегические и тактические подходы к нападению и защите в эпоху цифровых технологий The Art of Cyber Warfare explores the strategic and tactical approaches for offense and defense in the digital age. Drawing on historical conflicts from Sun Tzu to Carl von Clausewitz, the author illustrates that, despite...
Naval Institute Press, 2016. — 495 p. This book is written to be a comprehensive guide to cybersecurity and cyberwar policy and strategy, developed for a one- or two-semester class for students of public policy (including political science, law, business, etc.). Although written from a U.S. perspective, most of its contents are globally relevant. It is written essentially in...
Rand, 2009. — 239 p. Cyberspace, where information--and hence serious value--is stored and manipulated, is a tempting target. An attacker could be a person, group, or state and may disrupt or corrupt the systems from which cyberspace is built. When states are involved, it is tempting to compare fights to warfare, but there are important differences. The author addresses these...
Second Edition. — Naval Institute Press, 2021. — 512 p. This updated and expanded edition of Cyberspace in Peace and War by Martin C. Libicki presents a comprehensive understanding of cybersecurity, cyberwar, and cyber-terrorism. From basic concepts to advanced principles, Libicki examines the sources and consequences of system compromises, addresses strategic aspects of...
Second Edition. — Naval Institute Press, 2021. — 512 p. This updated and expanded edition of Cyberspace in Peace and War by Martin C. Libicki presents a comprehensive understanding of cybersecurity, cyberwar, and cyber-terrorism. From basic concepts to advanced principles, Libicki examines the sources and consequences of system compromises, addresses strategic aspects of...
Oxford University Press, 2016. — 202 p. In this work, an internationally-respected authority in military ethics describes a wholly new kind of cyber conflict that has utterly confounded the predictions of earlier experts in information warfare. Comparing this "state-sponsored hacktivism" to the transformative impact of "irregular warfare" in conventional armed conflict, Lucas...
Washington: Potomac Books, 2015. — 344 p. Former secretary of defense Leon Panetta once described cyber warfare as “the most serious threat in the twenty-first century,” capable of destroying our entire infrastructure and crippling the nation. Already, major cyber attacks have affected countries around the world: Estonia in 2007, Georgia in 2008, Iran in 2010, and most recently...
Potomac Books, 2015. — 344 p. Former secretary of defense Leon Panetta once described cyber warfare as “the most serious threat in the twenty-first century,” capable of destroying our entire infrastructure and crippling the nation. Already, major cyber attacks have affected countries around the world: Estonia in 2007, Georgia in 2008, Iran in 2010, and most recently the United...
Palgrave Macmillan, 2015. — 104 p. While the deterrence of cyber attacks is one of the most important issues facing the United States and other nations, the application of deterrence theory to the cyber realm is problematic. This study introduces cyber warfare and reviews the challenges associated with deterring cyber attacks, offering key recommendations to aid the deterrence...
New York: Apress, 2019. — 200 p. Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. You will quickly appreciate the difficulty and complexity of executing warfare...
Springer/Apress, 2019. — 125 p. — ISBN13: (electronic): 978-1-4842-4950-5. Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. You will quickly appreciate the...
Springer/Apress, 2019. — 125 p. — ISBN13: (electronic): 978-1-4842-4950-5. Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. You will quickly appreciate the...
Springer/Apress, 2019. — 125 p. — ISBN13: (electronic): 978-1-4842-4950-5. Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. You will quickly appreciate the...
Springer/Apress, 2019. — 192 p. — ISBN13: 978-1-4842-4949-9. Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. You will quickly appreciate the difficulty and...
Oxford University Press, 2015. — 320 p. Cyber weapons and cyber warfare have become one of the most dangerous innovations of recent years, and a significant threat to national security. Cyber weapons can imperil economic, political, and military systems by a single act, or by multifaceted orders of effect, with wide-ranging potential consequences. Unlike past forms of warfare...
Rowman and Littlefield Publishers, 2020. — 208 p. Cybersecurity expert Theresa Payton tells battlefront stories from the global war being conducted through clicks, swipes, internet access, technical backdoors and massive espionage schemes. She investigates the cyberwarriors who are planning tomorrow’s attacks, weaving a fascinating yet bone-chilling tale of Artificial...
Artech House, 2020. — 378 p. — ISBN: 1630815764. Conflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. As a result, knowledge of the topic is becoming essential across most disciplines. This book reviews and explains the technologies that underlie offensive and defensive cyber operations , which are practiced by a...
New York: Artech House, 2020. — 379 p. Conflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. As a result, knowledge of the topic is becoming essential across most disciplines. This book reviews and explains the technologies that underlie offensive and defensive cyber operations, which are practiced by a range of...
Urbana: University of Illinois Press, 2015. — 289 p. Contemporary discussion surrounding the role of the internet in society is dominated by words like: internet freedom, surveillance, cybersecurity, Edward Snowden and, most prolifically, cyber war. Behind the rhetoric of cyber war is an on-going state-centered battle for control of information resources. Shawn Powers and...
Vij Books India, 2016. — 232 p. Each era brings with it new techniques and methods of waging a war. While military scholars and experts have mastered land, sea, air and space warfare, time has come that they studied the art of cyberwar too. Our neighbours have acquired the capabilities to undertake this new form of asymmetric form of warfare. India too therefore needs to...
Palgrave Macmillan, 2014. — 99 p. Cyber-War provides a critical assessment of current debates around the likelihood and impact of cyber warfare. Approaching the subject from a socio-political angle, it argues that destructive cyber war has not yet been seen, but could be a feature of future conflict. Introduction: The Cyber Landscape Cyber and the Changing Nature of Conflict...
ABC-CLIO, 2013. — 305 p. This book provides an up-to-date, accessible guide to the growing threats in cyberspace that affects everyone from private individuals to businesses to national governments. Cyber Warfare: How Conflicts In Cyberspace Are Challenging America and Changing The World is a comprehensive and highly topical one-stop source for cyber conflict issues that...
Praeger, 2020. — 228 p. This illuminating book examines and refines the commonplace "wisdom" about cyber conflict―its effects, character, and implications for national and individual security in the 21st century. "Cyber warfare" evokes different images to different people. This book deals with the technological aspects denoted by "cyber" and also with the information operations...
Amsterdam: Syngress, 2013. — 337 p. Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and...
Syngress, 2013. — 337 p. Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific...
Santa-Barbara: ABC-Clio, 2017. — 400 p. This definitive reference resource on cyber warfare covers all aspects of this headline topic, providing historical context of cyber warfare and an examination its rapid development into a potent technological weapon of the 21st century. Provides comprehensive coverage of the major individuals, organizations, impacts, and issues related to...
Santa-Barbara: ABC-Clio, 2017. — 400 p. This definitive reference resource on cyber warfare covers all aspects of this headline topic, providing historical context of cyber warfare and an examination its rapid development into a potent technological weapon of the 21st century. Provides comprehensive coverage of the major individuals, organizations, impacts, and issues related to...
ABC-CLIO, 2020. — 356 p. This meticulously curated primary source collection is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019....
ABC-CLIO, 2020. — 356 p. This meticulously curated primary source collection is designed to offer a broad examination of key documents related to cyber warfare, covering the subject from multiple perspectives. The earliest documents date from the late 20th century, when the concept and possibility of cyber attacks became a reality, while the most recent documents are from 2019....
ABC-CLIO, 2017. — 400 p. This definitive reference resource on cyber warfare covers all aspects of this headline topic, providing historical context of cyber warfare and an examination its rapid development into a potent technological weapon of the 21st century. Provides comprehensive coverage of the major individuals, organizations, impacts, and issues related to cyber warfare...
Palgrave Macmillan, 2022. — 550 р. This book provides a detailed examination of the threats and dangers facing the West at the far end of the cybersecurity spectrum. It concentrates on threats to critical infrastructure which includes major public utilities. It focusses on the threats posed by the two most potent adversaries/competitors to the West, Russia and China, whilst...
Orange Education Pvt Ltd, AVA, 2024. — 342 p. — ISBN 978-81-96890-31-5. This book serves as a starter roadmap for offensive cyber operators as well as lawmakers who may not be privy to modern issues in tech. It is built around The Jester Dynamic as covered in Chapter 1 and narrated by TJ O'Connor's SANS Study. As we progress through the chapters, we will use a Purple Teaming...
Orange Education Pvt Ltd, AVA, 2024. — 342 p. — ISBN 978-81-96890-31-5. This book serves as a starter roadmap for offensive cyber operators as well as lawmakers who may not be privy to modern issues in tech. It is built around The Jester Dynamic as covered in Chapter 1 and narrated by TJ O'Connor's SANS Study. As we progress through the chapters, we will use a Purple Teaming...
Routledge, 2020. — 148 p. The desire to steal the intellectual property (IP) of others, be they creative individuals or company teams working in patent pools to create new innovations, remains the same. Political methods have become more sophisticated in terms of devaluing the output of creative humans by creating open- source access, which can be taken freely by all and...
Oxford University Press, 2015. — 266 p. In 2011, the United States government declared a cyber attack as equal to an act of war, punishable with conventional military means. Cyber operations, cyber crime, and other forms of cyber activities directed by one state against another are now considered part of the normal relations range of combat and conflict, and the rising fear of...
Syngress, 2016. — 133 p. — ISBN: 978-0-12-805197-9. Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and...
Wiley-ISTE, 2011. — 448 p. Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of...
Wagner Press, 2017. — 494 p. An exhaustive and comprehensive probing into the vast universe of cyber terrorism and the havoc it can wreak. With many pages of references and data, these insights into the reach of cyberspace from the private sector to world governments will open your eyes to the evolving landscape of internet security.
2nd Edition. — Routledge, 2023. — 365 р. — ISBN: 978-1-032-15939-3. This textbook offers an accessible introduction to the historical, technical, and strategic context of global cyber conflict. The second edition has been revised and updated throughout, with three new chapters. Cyber warfare involves issues of doctrine, strategy, policy, international relations (IR) and...
Routledge, 2019. — 307 p. This textbook offers an accessible introduction to the historical, technical, and strategic context of cyber conflict. The international relations, policy, doctrine, strategy, and operational issues associated with computer network attack, computer network exploitation, and computer network defense are collectively referred to as cyber warfare. This...
Syngress, Enselvier, 2013., - 164 p., ISBN: 0124047378 The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network...
Springer, 2015. — 285 p. This volume gives readers a glimpse, by all means far from being comprehensive, on new and emerging ways that Computational Intelligence and Machine Learning methods can be applied to issues related to cyberwarfare. The book includes a number of chapters that can be conceptually divided into three topics: chapters describing different data analysis...
Документ «The Tallinn Manual on the International Law Applicable to Cyber Warfare», под редакций профессора Майкла Шмидта из Кембриджа. — Cambrige University: 2013. — 302 с. Это не концепция, а полноценное руководство по ведению кибервойны. Учитывая состав участников проекта, данный документ можно назвать руководством по ведению кибервойны стран НАТО. Документ неофициальный,...
Комментарии