CyberWar

Si Vis Pacem, Para Bellum

By

Information Warfare: How to Survive Cyber Attacks

Information Warfare: How to Survive Cyber AttacksAnother release in our popular “Computer World: Books for IT Leaders” series, Information Warfare explains the methodologies behind hacks and cyber attacks and provides defensive strategies and counter measures designed to help companies survive infrastructure attacks, military conflicts, competitive intelligence gathering, economic warfare, and corporate espionage. The authors are renowned industry experts–Michael Erbschloe has connections with the government and is known for his analysis of The Love Bug.





Price: $29.99

Click here to buy from Amazon

By

Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security Experts

Live Hacking: The Ultimate Guide to Hacking Techniques & Countermeasures for Ethical Hackers & IT Security ExpertsDr. Ali Jahangiri, a world-renowned information technology (IT) expert, brings us the next must-have in IT training: Live Hacking, the definitive and comprehensive guide to computer hacking. Groundbreaking, insightful, and practical, this guide serves to inform IT professionals about and challenge existing conceptions of hacking, its victims, and its consequences, but with an eye to empowering prospective victims with the knowledge they need to thwart the criminal elements in cyberspace. Whether you work in a Fortune 500 company or if you’re just looking to protect your home office from hackers, this book will provide you with all the information you need to protect your valuable information. Live Hacking is straightforward, easy to read, and a reference that you’ll use again and again. It’s the kind of book you’ll want to keep in your back pocket! With a user-friendly writing style and easy-to-follow diagrams and computer screenshots.

Price: $49.95

Click here to buy from Amazon

By

Asymmetric Warfare

Asymmetric WarfareAsymmetric warfare is war between belligerents whose relative military power differs significantly, or whose strategy or tactics differ significantly. “Asymmetric warfare” can describe a conflict in which the resources of two belligerents differ in essence and in the struggle, interact and attempt to exploit each other’s characteristic weaknesses. Such struggles often involve strategies and tactics of unconventional warfare, the “weaker” combatants attempting to use strategy to offset deficiencies in quantity or quality. Such strategies may not necessarily be militarized. This is in contrast to symmetric warfare, where two powers have similar military power and resources and rely on tactics that are similar overall, differing only in details and execution.

Price: $57.00

Click here to buy from Amazon

By

Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow’s Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality)

Securing Electricity Supply in the Cyber Age: Exploring the Risks of Information and Communication Technology in Tomorrow's Electricity Infrastructure (Topics in Safety, Risk, Reliability and Quality)The electricity infrastructure is one of society’s most critical infrastructures. The complexity of the electricity infrastructure system is increasing quickly, due to the increasing intensity of market-based power exchanges between electricity systems, the associated market restructuring and an increasing share of decentralized generation. As a consequence, the organizational complexity of power systems has exploded. At the same time, there is a shift in public and societal goals towards low-carbon and sustainable power generation. This will eventually require a drastic transformation of the industry. Increasingly, ICT is being depended upon for managing this infrastructure, for technical control and operation and for facilitating markets. A recent example is demand-side management, based on detailed metering of consumption and decentralized electricity generation.

The mutual dependence of the electricity and the ICT infrastructures raises challenging questions in the areas of dependability, security and resilience. Examples include vulnerability to (cyber) attacks, avoiding and repairing technical failures and protecting data confidentiality, while guaranteeing accessibility. Therefore, better models and methods for protection against exploits of system vulnerabilities, whether accidental or intentional such as in cyber attacks, are called for.

To address the above mentioned problems an advanced research workshop: “Electricity security in the cyber age: Managing the increasing dependence of the electricity infrastructure on ICT” was organized in the Netherlands in May 2009. The objective of the workshop was to contribute to the security of current and future electricity infrastructures by analyzing the risks that are caused by the increasing reliance upon ICT and investigating options for managing these risks. The book presents the contributions to the workshop by distinguished invited keynote speakers and participants from the international scientific and industrial community.

Price: $129.00

Click here to buy from Amazon

By

Information Warfare and Cyber Security

Information Warfare and Cyber SecurityThis digital document is an article from Air Force Law Review, published by U.S. Air Force Academy, Department of Law on December 22, 2009. The length of the article is 22724 words. The page length shown above is based on a typical 300-word page. The article is delivered in HTML format and is available immediately after purchase. You can view it with any web browser.

Citation Details
Title: Cyber warfare operations: development and use under international law.
Author: Arie J. Schaap
Publication: Air Force Law Review (Magazine/Journal)
Date: December 22, 2009
Publisher: U.S. Air Force Academy, Department of Law
Issue: 64 Page: 121(53)

Distributed by Gale, a part of Cengage Learning

Price:

Click here to buy from Amazon

/* */