CyberWar

Si Vis Pacem, Para Bellum

By

Cybersecurity: Public Sector Threats and Responses (Public Administration and Public Policy)

Cybersecurity: Public Sector Threats and Responses (Public Administration and Public Policy)The Internet has given rise to new opportunities for the public sector to improve efficiency and better serve constituents in the form of e-government. But with a rapidly growing user base globally and an increasing reliance on the Internet, digital tools are also exposing the public sector to new risks.

An accessible primer, Cybersecurity: Public Sector Threats and Responses focuses on the convergence of globalization, connectivity, and the migration of public sector functions online. It identifies the challenges you need to be aware of and examines emerging trends and strategies from around the world. Offering practical guidance for addressing contemporary risks, the book is organized into three sections:

 

  • Global Trends—considers international e-government trends, includes case studies of common cyber threats and presents efforts of the premier global institution in the field
  • National and Local Policy Approaches—examines the current policy environment in the United States and Europe and illustrates challenges at all levels of government
  • Practical Considerations—explains how to prepare for cyber attacks, including an overview of relevant U.S. Federal cyber incident response policies, an organizational framework for assessing risk, and emerging trends

 

Also suitable for classroom use, this book will help you understand the threats facing your organization and the issues to consider when thinking about cybersecurity from a policy perspective.

Price: $59.95

Click here to buy from Amazon

By

Hybrid and Cyber War As Consequences of the Asymmetry: A Comprehensive Approach Answering Hybrid Actors and Activities in Cyberspace

Hybrid and Cyber War As Consequences of the Asymmetry: A Comprehensive Approach Answering Hybrid Actors and Activities in CyberspaceAll political and military conflicts now have a cyber dimension, the size and impact of which are difficult to predict. Internet-enabled propaganda, espionage and attacks on critical infrastructure can target decision makers, weapons systems and citizens in general, during times of peace or war. Traditional threats to national security now have a digital delivery mechanism which would increase the speed, diffusion and power of an attack. There have been no true cyber wars to date, but cyber battles of great consequence are easy to find. This book is divided into two sections – Strategic Viewpoints and Technical Challenges & Solutions – and highlights the growing connection between computer security and national security.

IOS Press is an international science, technical and medical publisher of high-quality books for academics, scientists, and professionals in all fields.

Some of the areas we publish in:

-Biomedicine
-Oncology
-Artificial intelligence
-Databases and information systems
-Maritime engineering
-Nanotechnology
-Geoengineering
-All aspects of physics
-E-governance
-E-commerce
-The knowledge economy
-Urban studies
-Arms control
-Understanding and responding to terrorism
-Medical informatics
-Computer Sciences

Price: $69.95

Click here to buy from Amazon

By

Terror on the Internet: The New Arena, the New Challenges

Terror on the Internet: The New Arena, the New ChallengesTerrorists fight their wars in cyberspace as well as on the ground. However, while politicians and the media have hotly debated the dangers of terrorists sabotaging the Internet, surprisingly little is known about terrorists’ actual use of the Internet.

In this timely and eye-opening volume, Gabriel Weimann reveals that terrorist organizations and their supporters maintain hundreds of websites, taking advantage of the unregulated, anonymous, and accessible nature of the Internet to target an array of messages to diverse audiences. Drawing on a seven-year study of the World Wide Web, the author examines how modern terrorist organizations exploit the Internet to raise funds, recruit members, plan and launch attacks, and publicize their chilling results. Weimann also investigates the effectiveness of counterterrorism measures and warns that this cyberwar may cost us dearly in terms of civil rights.

Illustrated with numerous examples taken from terrorist websites, Terror on the Internetoffers the definitive introduction to this emerging and dynamic arena. Weimann lays bare the challenges we collectively face in confronting the growing and increasingly sophisticated terrorist presence on the Net. A publication of the United States Institute of Peace, distributed by Potomac Books, Inc.

Price: $24.95

Click here to buy from Amazon

By

Modern Warfare, Intelligence and Deterrence: The Technologies That Are Transforming Them (The Economist)

Modern Warfare, Intelligence and Deterrence: The Technologies That Are Transforming Them (The Economist)An in-depth look at Western military technology from the experts at The Economist

Much has been made of the limitations of Western technology when pitted against today’s low-tech insurgencies. Modern Warfare, Intelligence and Deterrence: The Technology That is Transforming Themexplores emerging high tech military technologies and places them in the larger context of today’s politics, diplomacy, business, and social issues, arguing that, broadly speaking, defense technologies will continue to provide enormous advantages to advanced, Western armed forces.

The book is organized into five parts: land and sea, air and space, the computer factor, intelligence and spycraft, and the road ahead (which examines the coming challenges for Western armies, such as new wars against insurgents operating out of civilian areas). Comprised of a selection of the best writing on the subject from The Economist, each section includes an introduction linking the technological developments to civilian matters.

  • Looks at new and emerging military technologies, including the Panzerfaust-3, a German shoulder-fired heat-seeking antitank missile, the MPR-500, an Israeli precision bomb, Russia’s Sizzler, an anti-ship missile that can travel 300 kilometers, and many others
  • Explains how military and intelligence technologies are changing the world
  • Edited by Benjamin Sutherland, a writer for The Economist and expert on the social, political, and business implications of new and disruptive technologies

A fascinating look at Western military technologies, Modern Warfare, Intelligence and Deterrenceis essential reading for business readers and history buffs, alike.

Price: $24.95

Click here to buy from Amazon

By

Data Mining and Machine Learning in Cybersecurity

Data Mining and Machine Learning in CybersecurityWith the rapid advancement of information discovery techniques, machine learning and data mining continue to play a significant role in cybersecurity. Although several conferences, workshops, and journals focus on the fragmented research topics in this area, there has been no single interdisciplinary resource on past and current works and possible paths for future research in this area. This book fills this need.

From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, Data Mining and Machine Learning in Cybersecurity provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals and surveys contemporary challenges—detailing cutting-edge machine learning and data mining techniques.

It also:

  • Unveils cutting-edge techniques for detecting new attacks
  • Contains in-depth discussions of machine learning solutions to detection problems
  • Categorizes methods for detecting, scanning, and profiling intrusions and anomalies
  • Surveys contemporary cybersecurity problems and unveils state-of-the-art machine learning and data mining solutions
  • Details privacy-preserving data mining methods

 

This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures help readers visualize the workflow of complex techniques and more than forty case studies provide a clear understanding of the design and application of data mining and machine learning techniques in cybersecurity.

Price: $89.95

Click here to buy from Amazon

/* */