Amazon Price: $52.00 $45.58 You save: $6.42 (12%). (as of November 22, 2017 11:19 –
This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernization of its military, not only identifying the "what" but also addressing the "why" behind China's focus on establishing information dominance as a key component of its military efforts.
• Provides a detailed overview and thorough analysis of Chinese cyber activities
Continue reading “Cyber Dragon: Inside China's Information Warfare and Cyber Operations (Praeger Security International)”
Amazon Price: $52.00 $49.95 You save: $2.05 (4%). (as of November 22, 2017 10:30 –
Cyber Warfare: How Conflicts In Cyberspace Are Challenging America and Changing The World is a comprehensive and highly topical one-stop source for cyber conflict issues that provides scholarly treatment of the subject in a readable format. The book provides a level-headed, concrete analytical foundation for thinking about cybersecurity law and policy questions, covering the entire range of cyber issues in the 21st century, including topics such as malicious software, encryption, hardware intrusions, privacy and civil liberties concerns, and other interesting aspects of the problem.
In Part I, the author describes the nature of cyber threats, including the threat of cyber warfare. Part II describes the policies and practices currently in place, while Part III proposes optimal responses to the challenges we face. The work should be considered essential reading for national and homeland security professionals as well as students and lay readers wanting to understand of the scope of our shared cybersecurity problem.
Amazon Price: $75.00 (as of November 22, 2017 13:26 –
Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government-international, national, state, and local. * Provides accessible, comprehensive coverage of a complex topic that encompasses identity theft to copyright infringement written for non-technical readers * Pays due attention to important elements of cybercrime that have been largely ignored in the field, especially politics * Supplies examinations of both the domestic and international efforts to combat cybercrime * Serves an ideal text for first-year undergraduate students in criminal justice programs
Amazon Price: $63.00 $63.00 (as of November 22, 2017 14:46 –
Military robots are already being used in conflicts around the globe and are affecting both the decision to go to war and the means by which wars are conducted. This book covers the history of military robotics, analyzes their current employment, and examines the ramifications of their future utilization.
• Clearly identifies the links between the technological developments of the most recent innovations and the ethical and legal challenges of the future
Continue reading “Outsourcing War to Machines: The Military Robotics Revolution (Praeger Security International)”
Amazon Price: $194.00 (as of November 22, 2017 18:07 –
Cyber attacks disturb business operations, leak confidential information, and disrupt organizations, government agencies, and individuals on a daily basis. In this revealing work, experienced policymakers, security practitioners, and academic experts explain ways to combat current and future cyber attacks through technology. The inclusion of recent cybercrime case studies in the book serves to showcase current crime methodologies, incident response, investigative procedures, and forensic analysis and techniques.
The first volume of the set focuses on cybersecurity issues that impact government as well as the government's role in managing the nation's digital security. The second volume addresses the security issues that affect the private sector, particularly businesses engaged in technology endeavors. The third volume considers issues that impact consumers as well as users of social media and other communication tools. This comprehensive resource provides strategies for early identification and prevention of future attacks, and proposes workable solutions for maintaining a secure data environment.