Cyber Terrorism and Information Warfare: Threats and Responses

Cyber Terrorism and Information Warfare: Threats and Responses (Terrorism library series)Cyber terrorism is an emerging new mode of information warfare underscoring the perpetrators' deliberate exploitation of civilian and military systems' inherent vulnerabilities, thereby affecting national and global security. This volume includes contributions made by academics, policymakers, and professionals at seminars and conferences co-sponsored by the International Center for Terrorism Studies (Potomac Institute for Policy Studies), and the Terrorism Studies Center (The George Washington University), during the past several years. It also includes statements by key government officials and industry experts at different forums in the United States dealing with both threats and responses.

Included are the statements and assessments of James Adams, Edgar A. Adamson, Madeleine Albright, Mario Balakgie, Elizabeth Banker, Bill Clinton, Fred Cohen, James X. Dempsey, Dianne Feinstein, Kenneth Flamm, Louis J. Freeh, Gideon Frieder, Tom Fuhrman, Charles Giancarlo, Eric Holder, Feisal Keblawi, Jon Kyl, Neal Lane, Joseph Lieberman, Robert T. Marsh, Paul Misener, Roger Molander, Richard Pethia, Janet Reno, Howard Schmidt, Charles Schumer, Robert Shea, David L. Sobel, John Tritak, and Michael A. Vatis.

Price: $25.00

Click here to buy from Amazon

Cyber Commander’s Handbook

Cyber Commander's HandbookThe global reliance on computers, networks and systems continues to grow. As our dependency grows so do the threats that target our military s Command, Control, Communications, Computers, Intelligence, Surveillance, Reconnaissance (C4ISR) systems as well as the operational components and electronic controls for our critical infrastructure. Over the past decade we have experienced a substantial rise in the complexity and sophistication of cyber attacks as well as a frightening increase in the impact of some of the attacks. Every computer is a potential cyber weapon waiting to be loaded and used by extremists, criminals, terrorists and rogue nation states. As the world becomes more and more dependent on computers and information technology, the greater the risk of cyber attacks. Government and military leaders now face this fact and our critical systems and infrastructure remain at great risk! This risk has made the ability to defend these critical systems and direct cyber attacks core capabilities required for the modern military. In the age of cyber conflict, leaders need to understand the weapons and strategies used to wage this rapidly evolving type of warfare. This handbook will provide the background needed to understand the new world of cyber warfare, define the tools and techniques for offensive and defensive action, and provide insight into the strategies behind building a dynamic and relevant cyber warfare capability.

Price: $29.95

Mobile Malware Attacks and Defense

Mobile Malware Attacks and DefenseMalware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.

* Visual Payloads
View attacks as visible to the end user, including notation of variants.

* Timeline of Mobile Hoaxes and Threats
Understand the history of major attacks and horizon for emerging threates.

* Overview of Mobile Malware Families
Identify and understand groups of mobile malicious code and their variations.

* Taxonomy of Mobile Malware
Bring order to known samples based on infection, distribution, and payload strategies.

* Phishing, SMishing, and Vishing Attacks
Detect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.

* Operating System and Device Vulnerabilities
Analyze unique OS security issues and examine offensive mobile device threats.

* Analyze Mobile Malware
Design a sandbox for dynamic software analysis and use MobileSandbox to analyze mobile malware.

* Forensic Analysis of Mobile Malware
Conduct forensic analysis of mobile devices and learn key differences in mobile forensics.

* Debugging and Disassembling Mobile Malware
Use IDA and other tools to reverse-engineer samples of malicious code for analysis.

* Mobile Malware Mitigation Measures
Qualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.

* Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks

* Analyze Mobile Device/Platform Vulnerabilities and Exploits

* Mitigate Current and Future Mobile Malware Threats

Price: $59.95

Click here to buy from Amazon

Nuclear Infrastructure Protection and Homeland Security

Nuclear Infrastructure Protection and Homeland SecurityExperts agree, though it is already important, nuclear power will soon be critical to the maintenance of contemporary society. With the heightened importance of nuclear energy comes a heightened threat of terrorism. The possibility of nuclear energy infrastructure terrorism-that is, the use of weapons to cause damage to the nuclear energy industrial sector, which would have widespread, devastating effects-is very real. In Nuclear Infrastructure Protection and Homeland Security, authors Frank R. Spellman and Melissa L. Stoudt present all the information needed for nuclear infrastructure employers and employees to handle security threats they must be prepared to meet. The book focuses on three interrelated nuclear energy infrastructure segments: nuclear reactors, radioactive materials, and nuclear waste. It presents common-sense methodologies in a straightforward manner, so the text is accessible even to those with little experience with nuclear energy who are nonetheless concerned about the protection of our nuclear infrastructure. Important safety and security principles are outlined, along with security measures that can be implemented to ensure the safety of nuclear facilities.

Price: $85.00

Click here to buy from Amazon

Enhanced by Zemanta

Network Centric Warfare and Coalition Operations: New Military Operating System

Network Centric Warfare and Coalition Operations: The New Military Operating System (Routledge Global Security Studies)This book argues that Network Centric Warfare (NCW) influences how developed militaries operate in the same fashion that an operating system influences the development of computer software.

It examines three inter-related issues: the overwhelming military power of the United States; the growing influence of NCW on military thinking; and the centrality of coalition operations in modern military endeavours. Irrespective of terrorist threats and local insurgencies, the present international structure is remarkably stable – none of the major powers seeks to alter the system from its present liberal character, as demonstrated by the lack of a military response to US military primacy. This primacy privileges the American military doctrine and thus the importance of NCW, which promises a future of rapid, precise, and highly efficient operations, but also a future predicated on the ‘digitization’ of the battle space. Participation in future American-led military endeavours will require coalition partners to be networked: ‘interoperability’ will therefore be a key consideration of a partner’s strategic worth.

Network Centric Warfare and Coalition Operations will be of great interest to students of strategic studies, international security, US foreign policy and international relations in general.

Price: $135.00

Click here to buy from Amazon