Threats to international peace and security include the proliferation of weapons of mass destructions, rogue nations, and international terrorism. The United States must respond to these challenges to its national security and to world stability by embracing new military technologies such as drones, autonomous robots, and cyber weapons. These weapons can provide more precise, less destructive means to coerce opponents to stop WMD proliferation, clamp down on terrorism, or end humanitarian disasters. Efforts to constrain new military technologies are not only doomed, but dangerous. Most weapons in themselves are not good or evil; their morality turns on the motives and purposes for the war itself. These new weapons can send a strong message without cause death or severe personal injury, and as a result can make war less, rather than more, destructive.
The emergence of the hominids, more than five million years ago, marked the start of the human odyssey through space and time. This book deals with the last stage of this fascinating journey: the exploration of cyberspace and cybertime. Through the rapid global implementation of information and communication technologies, a new realm for human experience and imagination has been disclosed. Reversely, these postgeographical and posthistorical technologies have started to colonize our bodies and minds. Taking Homer's Odyssey and Kubrick's 2001: A Space Odyssey as his starting point, the author investigates the 'informatization of the world-view', focusing on its implications for our culture – arts, religion, and science – and, ultimately, our form of life. Moving across a wide range of disciplines, varying from philosophical anthropology and palaeontology to information theory, and from astrophysics to literary, film and new media studies, the author discusses our 'cyberspace odyssey' from a reflective position beyond euphoria and nostalgia. His analysis is as profound as nuanced and deals with issues that will be high on the agenda for many decades to come. In 2003 a Dutch Edition of Cyberspace Odyssey received the Socrates Prize for the best philosophy book published in Dutch.
Another release in our popular “Computer World: Books for IT Leaders” series, Information Warfare explains the methodologies behind hacks and cyber attacks and provides defensive strategies and counter measures designed to help companies survive infrastructure attacks, military conflicts, competitive intelligence gathering, economic warfare, and corporate espionage. The authors are renowned industry experts–Michael Erbschloe has connections with the government and is known for his analysis of The Love Bug.
The Cold War paved the way for computers to be used as weapons. Jake Downing was there from the beginning. He was America’s first cyber spy.
Jake grew up in rural America during the 50’s, went to war for America and was wounded. He returned home, attended college and did pioneering research in computer science.
Continue reading “Cold War Cyber Spy”
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented.
Divided into 11 chapters, the book explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also discusses industrial networks as they relate to “critical infrastructure and cyber security, potential risks and consequences of a cyber attack against an industrial control system, compliance controls in relation to network security practices, industrial network protocols, such as Modbus and DNP3, assessment of vulnerabilities and risk, how to secure enclaves, regulatory compliance standards applicable to industrial network security, and common pitfalls and mistakes, like complacency and deployment errors.
This book is a valuable resource for plant operators and information security analysts, as well as compliance officers who want to pass an audit with minimal penalties and/or fines.
Covers implementation guidelines for security measures of critical infrastructureApplies the security measures for system-specific complianceDiscusses common pitfalls and mistakes and how to avoid them