CyberWar

Si Vis Pacem, Para Bellum

By

The Stuxnet Computer Worm and Industrial Control System Security (Defense, Security and Strategies)

The Stuxnet Computer Worm and Industrial Control System Security (Defense, Security and Strategies)In September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. Through the use of thumb drives in computers that were not connected to the Internet, a malicious software program known as Stuxnet infected computer systems that were used to control the functioning of a nuclear power plant. Once inside the system, Stuxnet had the ability to degrade or destroy the software on which it operated. This book examines the discovery of the Stuxnet worm which has raised several issues for Congress, including the effect on national security, what the government’s response should be, whether an international treaty to curb the use of malicious software is necessary, and how such a treaty could be implemented.

Price: $125.00

Click here to buy from Amazon

By

Cyberwar, Netwar and the Revolution in Military Affairs (part 1)

Cyberwar, Netwar and the Revolution in Military Affairs (part 1) The end of the Cold War, the Revolution in Military Affairs, 9/11 and the War on Terror have radically altered the nature of conflict and security in the twenty-first century. This book considers how developments in technology could and are effecting the prosecution of war and what the changing nature of warfare means for human rights and civil society.







Price: $100.00

Click here to buy from Amazon

By

Cyber-Conflict and Global Politics

Cyber-Conflict and Global PoliticsThis volume examines theoretical and empirical issues relating to cyberconflict and its implications for global security and politics.

Taking a multidimensional approach to current debates in internet politics, the book comprises essays by leading experts from across the world. The volume includes a comprehensive introduction to current debates in the field and their ramifications for global politics, and follows this with empirical case studies. These include cyberconflict, cyberwars, information warfare and hacktivism, in contexts such as Sri Lanka, Lebanon and Estonia, the European Social Forum, feminist cybercrusades and the use of the internet as a weapon by ethnoreligious and socio-political movements. The volume presents the theoretical debates and case studies of cyberconflict in a coherent, progressive and truly multidisciplinary way.

The book will be of interest to students of cyberconflict, internet politics, security studies and IR in general.

Price: $39.95

Click here to buy from Amazon

By

cyberhug.me: hacktivist cyberwars for human rights

cyberhug.me: hacktivist cyberwars for human rights“Where human rights reign, there is our country.
Where human rights are abused, there is our work.”

When evil resists a push, it doesn’t push back, it immediately seeks to destroy.
Boldness is required for first limiting and then overcoming evil.
Of course surviving is nice too.

Hacker School: a prequel requested by readers of cyberhug.me.

The Trilogy:

A discontinuous progression toward
recovering inalienable human rights.

*hacktivist* ~ Cyberwar explodes over a despotism’s genocide: The cyberhug.me trilogy starts with a lone hackster in cyberbattle.

Complicit Simplicity ~ As cyberwars extend beyond the ability of lone hackers, a hacktivism team forms to fight for human rights.

Abacus Brief ~ Moonlit Knight’s Cyberwar and Peace: On a beautiful Pacific Island hacktivism becomes a tribal project, seeking liberation from modern pirates.

Price: $15.99

Click here to buy from Amazon

By

Reverse Deception Organized Cyber Threat Counter-Exploitation

Reverse Deception Organized Cyber Threat Counter-ExploitationA complete guide to understanding and fighting advanced persistent threats—today’s most destructive risk to enterprise security

Reverse Deception: Organized Cyber Threat Counter-Exploitation explains how to identify advanced persistent threats (APTs), categorize them according to risk level, and prioritize your actions accordingly by applying expert, field-tested private- and government-sector methods (NSA, FBI, and DOD).

APTs cannot be seen, spread invisibly, and then continue to live in an enterprise network, undetected. In this one-of-a-kind book, the authors explain how to get—and stay—ahead of today’s well-organized and extremely persistent brand of network enemies. The book describes the characteristics of malware and botnets, how they can morph, evade detection, and spin off decoys that live in-network, while appearing to have been cleaned up and debugged. This detailed guide then reveals how to detect the appearance of malicious code, decode the types of enemies they originate from, and finally, how to extricate malcode and deflect its future entry into networks.

Reverse Deception: Organized Cyber Threat Counter-Exploitation features:

  • Full coverage of the #1 feared type of network attack today, the APT
  • Descriptions of cyber espionage tactics seen in the U.S. and internationally, with comparisons of the types of countermeasures permissible by law in the U.S. and Asia versus less strict countries in Europe, the Middle East, and Africa
  • Enthralling case studies and true stories from the authors’ FBI, DOD, NSA, and private sector work
  • Foreword by Fred Feer, a security professional with 40 years’ experience with the U.S. Army counterintelligence, CIA, RAND, and independent consulting
  • Complete coverage of key aspects of deception, counter-deception, behavioral profiling, and security within the cyber realm
  • Cat-and-mouse strategies from the best in the game—explains how to implement deception and disinformation techniques against a variety of incoming threats aimed at enticing adversaries out into the open
  • A fresh perspective on innovative, field-tested ideas for successfully countering current digital threats—plus expected characteristics of the next threats to come
  • Legal explanations of capabilities, limitations, and requirements for assisting law enforcement investigations

Coverage includes:
Deception Throughout History to Today; The Applications & Goals of Cyber Counterintelligence; The Missions and Outcomes of Criminal Profiling; Legal & Ethical Aspects of Deception; Attack Tradecraft; Operational Deception; Tools, Tactics & Procedures; Attack Attribution; Black Hat Motivators; Understanding Advanced Persistent Threats; When & When Not to Act; Implementation & Validation Tactics

Price: $40.00

Click here to buy from Amazon

 

/* */