Tallinn Manual on the International Law Applicable to Cyber Warfare

Rating: 
Amazon Price: N/A (as of October 21, 2017 13:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The product of a three-year project by twenty renowned international law scholars and practitioners, the Tallinn Manual identifies the international law applicable to cyber warfare and sets out ninety-five 'black-letter rules' governing such conflicts. It addresses topics including sovereignty, State responsibility, the jus ad bellum, international humanitarian law, and the law of neutrality. An extensive commentary accompanies each rule, which sets forth the rule's basis in treaty and customary law, explains how the group of experts interpreted applicable norms in the cyber context, and outlines any disagreements within the group as to each rule's application.

Terrorism in Cyberspace: The Next Generation

Rating: 
Amazon Price: $30.00 $27.87 You save: $2.13 (7%). (as of October 20, 2017 17:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The war on terrorism has not been won, Gabriel Weimann argues in Terrorism in Cyberspace, the successor to his seminal Terror on the Internet. Even though al-Qaeda's leadership has been largely destroyed and its organization disrupted, terrorist attacks take 12,000 lives annually worldwide, and jihadist terrorist ideology continues to spread. How? Largely by going online and adopting a new method of organization. Terrorist structures, traditionally consisting of loose-net cells, divisions, and subgroups, are ideally suited for flourishing on the Internet through websites, e-mail, chat rooms, e-groups, forums, virtual message boards, YouTube, Google Earth, and other outlets. Terrorist websites, including social media platforms, now number close to 10,000.

This book addresses three major questions: why and how terrorism went online; what recent trends can be discerned―such as engaging children and women, promoting lone wolf attacks, and using social media; and what future threats can be expected, along with how they can be reduced or countered. To answer these questions, Terrorism in Cyberspace analyzes content from more than 9,800 terrorist websites, and Weimann, who has been studying terrorism online since 1998, selects the most important kinds of web activity, describes their background and history, and surveys their content in terms of kind and intensity, the groups and prominent individuals involved, and effects. He highlights cyberterrorism against financial, governmental, and engineering infrastructure; efforts to monitor, manipulate, and disrupt terrorists' online efforts; and threats to civil liberties posed by ill-directed efforts to suppress terrorists' online activities as future, worrisome trends.

Zero Day: A Jeff Aiken Novel (Jeff Aiken Series Book 1)

Rating: 
Amazon Price: N/A (as of October 20, 2017 19:57 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

An airliner's controls abruptly fail mid-flight over the Atlantic. An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction.

At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led up to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the United States computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn't much time if he hopes to prevent an international catastrophe.
Continue reading “Zero Day: A Jeff Aiken Novel (Jeff Aiken Series Book 1)”

Understanding Cyber Warfare and Its Implications for Indian Armed Forces

Amazon Price: N/A (as of July 17, 2017 04:25 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The book is divided into two parts. Part 1 deals with cyber warfare in general bringing out the unique characteristics of cyber space, the recent cyber attack on Estonia and the Stuxnet attack on Iranian Nuclear facilities, how the established Principles of War can be applied in cyberspace, cyber strategy of US and China, offensive and defensive aspects of cyber warfare cyber deterrence and the new challenge facing the militaries the world over- leadership in cyber domain. Part 2 is devoted to the Indian context. It discusses in detail the impact of ICT on the life of an ordinary Indian citizen, the cyber challenges facing the country and the implications for the Indian Armed Forces. A few recommendations have been summarised in the end.

Current and Emerging Trends in Cyber Operations: Policy, Strategy and Practice (Palgrave Studies in Cybercrime and Cybersecurity)

Amazon Price: N/A (as of October 20, 2017 16:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The field of cyber operations has seen increasing interest among both academics and professionals in recent years. It encompasses multiple disciplines, which are associated with both the technical and non-technical operations conducted in cyberspace. This book importantly focuses on the non-technical aspects, such as policy, strategy and best practice. In doing so, it presents both theoretical and practical approaches towards understanding the evolution of cyber operations.

Current and Emerging Trends in Cyber Operations provides a multidisciplinary examination of international trends, with contributions from scholars and high-profile practitioners working in the fields of cyber security, cyber warfare, and information management. An international approach is adopted – one that incorporates studies from a military (warfare) context as well as civilian (private industry) environments.
Continue reading “Current and Emerging Trends in Cyber Operations: Policy, Strategy and Practice (Palgrave Studies in Cybercrime and Cybersecurity)”