CyberWar

Si Vis Pacem, Para Bellum

By

An Introduction to DDoS Attacks and Defense Mechanisms: An Analyst’s Handbook

Rating: 
Amazon Price: $103.00 $92.32 You save: $10.68 (10%). (as of April 27, 2017 16:43 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.

By

Trojan Horse: A Novel

Rating: 
Amazon Price: $24.99 $8.00 You save: $16.99 (68%). (as of April 27, 2017 00:53 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

It’s two years after the Zero Day attacks, and cyber-security analyst Jeff Aiken is reaping the rewards for crippling Al-Qaida’s assault on the computer infrastructure of the Western world. His company is flourishing, and his relationship with former government agent Daryl Haugen has intensified since she became a part of his team.

But the West is under its greatest threat yet. A revolutionary, invisible trojan that alters data without leaving a trace—more sophisticated than any virus seen before—has been identified, roiling international politics. Jeff and Daryl are summoned to root it out and discover its source. As the trojan penetrates Western intelligence, and the terrifying truth about its creator is revealed, Jeff and Daryl find themselves in a desperate race to reverse it as the fate of both East and West hangs in the balance.
Read More

By

Hacktivism and Cyberwars: Rebels with a Cause?

Rating: 
Amazon Price: $61.95 $45.32 You save: $16.63 (27%). (as of April 27, 2017 11:27 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As global society becomes more and more dependent, politically and economically, on the flow of information, the power of those who can disrupt and manipulate that flow also increases. In Hacktivism and Cyberwars Tim Jordan and Paul Taylor provide a detailed history of hacktivism's evolution from early hacking culture to its present day status as the radical face of online politics. They describe the ways in which hacktivism has re-appropriated hacking techniques to create an innovative new form of political protest. A full explanation is given of the different strands of hacktivism and the 'cyberwars' it has created, ranging from such avant garde groups as the Electronic Disturbance Theatre to more virtually focused groups labelled 'The Digitally Correct'. The full social and historical context of hacktivism is portrayed to take into account its position in terms of new social movements, direct action and its contribution to the globalization debate.
This book provides an important corrective flip-side to mainstream accounts of E-commerce and broadens the conceptualization of the internet to take into full account the other side of the digital divide.

By

The Growing Cyberthreat from Iran: The Initial Report of Project Pistachio Harvest

Amazon Price: N/A (as of April 26, 2017 21:58 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Iran is emerging as a significant cyberthreat to the US and its allies. The size and sophistication of the nation’s hacking capabilities have grown markedly over the last few years, and Iran has already penetrated well-defended networks in the US and Saudi Arabia and seized and destroyed sensitive data. The lifting of economic sanctions as a result of the recently announced framework for a nuclear deal with Iran will dramatically increase the resources Iran can put toward expanding its cyberattack infrastructure. We must anticipate that the Iranian cyberthreat may well begin to grow much more rapidly. Yet we must also avoid overreacting to this threat, which is not yet unmanageable. The first requirement of developing a sound response is understanding the nature of the problem, which is the aim of this report.

Pistachio Harvest is a collaborative project between Norse Corporation and the Critical Threats Project at the American Enterprise Institute to describe Iran’s footprint in cyberspace and identify important trends in Iranian cyberattacks. It draws on data from the Norse Intelligence Network, which consists of several million advanced sensors distributed around the globe. Data from Norse systems combined with open-source information collected by the analysts of the Critical Threats Project have allowed us to see and outline for the first time the real nature and extent of the Iranian cyberthreat.

By

A Battle in Bits and Bytes: Computer Network Attacks – The Law of Armed Conflict

A Battle in Bits and Bytes: Computer Network Attacks and the Law of Armed Conflict (The Erik Castrén Research Reports, 27/2009)

Technology is an essential part of society in the Information Age. Warfare has always had a technological dimension. In the era of information and the interconnected world, the critical infrastructure of nations has become increasingly reliant upon computer networks: by using the methods of computer network attacks many critical functions of a State could be damaged. This has raised a discussion related to States’ national and economic security concerning a new battlefield, warfare in cyberspace.

This report surveys one new facet of technology: computer network attacks, from the framework of the law of armed conflict by asking if the existing law of armed conflict, the main parts of which have their origins in the legacies of two World Wars, applies to computer network attacks. Moreover, the report addresses the questions of the perpetrators of the computer network attacks in the context of the law of armed conflict, what targets can be attacked with the means and methods of computer network attacks and how these attacks should be conducted under the laws of armed conflict.

Price:

Click here to buy from Amazon

/* */