Amazon Price: $194.00 (as of March 25, 2017 13:57 –
Cyber attacks disturb business operations, leak confidential information, and disrupt organizations, government agencies, and individuals on a daily basis. In this revealing work, experienced policymakers, security practitioners, and academic experts explain ways to combat current and future cyber attacks through technology. The inclusion of recent cybercrime case studies in the book serves to showcase current crime methodologies, incident response, investigative procedures, and forensic analysis and techniques.
The first volume of the set focuses on cybersecurity issues that impact government as well as the government's role in managing the nation's digital security. The second volume addresses the security issues that affect the private sector, particularly businesses engaged in technology endeavors. The third volume considers issues that impact consumers as well as users of social media and other communication tools. This comprehensive resource provides strategies for early identification and prevention of future attacks, and proposes workable solutions for maintaining a secure data environment.
Amazon Price: N/A (as of March 25, 2017 10:16 –
Adopting a multidisciplinary perspective, this book explores the key challenges associated with the proliferation of cyber capabilities.
Over the past two decades, a new man-made domain of conflict has materialized. Alongside armed conflict in the domains of land, sea, air, and space, hostilities between different types of political actors are now taking place in cyberspace. This volume addresses the challenges posed by cyberspace hostility from theoretical, political, strategic and legal perspectives. In doing so, and in contrast to current literature, cyber-security is analysed through a multidimensional lens, as opposed to being treated solely as a military or criminal issues, for example. The individual chapters map out the different scholarly and political positions associated with various key aspects of cyber conflict and seek to answer the following questions: do existing theories provide sufficient answers to the current challenges posed by conflict in cyberspace, and, if not, could alternative approaches be developed?; how do states and non-state actors make use of cyber-weapons when pursuing strategic and political aims?; and, how does the advent of conflict in cyberspace challenge our established legal framework? By asking important strategic questions on the theoretical, strategic, ethical and legal implications and challenges of the proliferation of cyber warfare capabilities, the book seeks to stimulate research into an area that has hitherto been neglected.
Amazon Price: $17.95 $17.95 (as of March 26, 2017 02:14 –
This hearing will examine China's use of standards, regulation, and censorship as a market-entry barrier. It will also examine China's use of cyber espionage to gather information for commercial purposes, including turning over U.S. intellectual property to competing Chinese state-owned enterprises. Expert witnesses will address the breach of the OPM and related hacking of federal agencies. At the hearing, the Commissioners received testimony from the following witnesses: Samm Sacks, China Analyst, Eurasia Group; Matthew Schruers, Vice President for Law & Policy, Computer & Communications Industry Association; Paul M. Tiao, Partner, Hunton & Williams; Dennis F. Poindexter, author of The Chinese Information War, Espionage, Cyberwar, Communications Control and Related Threats to United States Interests; and Jen Weedon, Manager, Threat Intelligence and Strategic Analysis, FireEye and Mandiant, Inc.
Amazon Price: $39.95 $27.25 You save: $12.70 (32%). (as of March 25, 2017 10:48 –
The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas.
The first section provides a broad foundation and overview of the subject by identifying key policy issues, establishing a common vocabulary, and proposing an initial version of a theory of cyberpower. The second section identifies and explores possible changes in cyberspace over the next fifteen years by assessing cyber infrastructure and security challenges. The third section analyzes the potential impact of changes in cyberspace on the military and informational levers of power. The fourth section addresses the extent to which changes in cyberspace serve to empower key entities such as transnational criminals, terrorists, and nation-states. The final section examines key institutional factors, which include issues concerning governance, legal dimensions, critical infrastructure protection, and organization.
Amazon Price: $19.95 $19.95 (as of March 25, 2017 13:17 –
Few activities have captured the contemporary popular imagination as hacking and online activism, from Anonymous and beyond. Few political ideas have gained more notoriety recently than anarchism. Yet both remain misunderstood and much maligned. /Cyber Disobedience/ provides the most engaging and detailed analysis of online civil disobedience and anarchism today.