Amazon Price: $159.95 $154.83 You save: $5.12 (3%). (as of April 20, 2018 08:41 –
Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace could be used to increase power.
Through an empirical, conceptual and theoretical approach, Cyber Conflict has been written by researchers and experts in the fields of cyber security, cyber defense and information warfare. It aims to analyze the processes of information warfare and cyber warfare through historical, operational and strategic perspectives of cyber attack. It is original in its delivery because of its multidisciplinary approach within an international framework, with studies dedicated to different states – Canada, Cuba, France, Greece, Italy, Japan, Singapore, Slovenia and South Africa – describing the state’s application of information warfare principles both in terms of global development and “local” usage and examples.
Continue reading “Cyber Conflict: Competing National Perspectives (ISTE)”
Amazon Price: N/A (as of April 19, 2018 18:46 –
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators’ activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace.
The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators, their motives and their organizations. Tools for implementing attacks are also briefly mentioned, however this book is not technical and does not intend to instruct readers about the technical aspects of cybercrime, but rather focuses on managerial views of cybercrime. Other sections of this chapter deal with the protection against attacks, fear, investigation and the cost of cybercrime. Relevant legislation and legal bodies, which are used in cybercrime, are briefly described at the end of the chapter.
The second chapter deals with cyberwarfare and explains the difference between classic cybercrime and operations taking place in the modern inter-connected world. It tackles the following questions: who is committing cyberwarfare; who are the victims and who are the perpetrators? Countries which have an important role in cyberwarfare around the world, and the significant efforts being made to combat cyberwarfare on national and international levels, are mentioned.
The common points of cybercrime and cyberwarfare, the methods used to protect against them and the vision of the future of cybercrime and cyberwarfare are briefly described at the end of the book.
Continue reading “Cybercrime and Cyber Warfare (FOCUS Series)”
Amazon Price: N/A (as of April 19, 2018 18:12 –
“Computing Networks” explores the core of the new distributed computing infrastructures we are using today: the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to better understand the technologies, specificities, constraints and benefits of these different infrastructures’ communication systems.
Cloud Computing will give the possibility for millions of users to process data anytime, anywhere, while being eco-friendly. In order to deliver this emerging traffic in a timely, cost-efficient, energy-efficient, and reliable manner over long-distance networks, several issues such as quality of service, security, metrology, network-resource scheduling and virtualization are being investigated since 15 years. “Computing Networks” explores the core of clusters, grids and clouds networks, giving designers, application developers and users the keys to better construct and use these powerful infrastructures.
Amazon Price: $165.00 $142.06 You save: $22.94 (14%). (as of April 19, 2018 16:43 –
The new digital media offers us an unprecedented memory capacity, an ubiquitous communication channel and a growing computing power. How can we exploit this medium to augment our personal and social cognitive processes at the service of human development? Combining a deep knowledge of humanities and social sciences as well as a real familiarity with computer science issues, this book explains the collaborative construction of a global hypercortex coordinated by a computable metalanguage. By recognizing fully the symbolic and social nature of human cognition, we could transform our current opaque global brain into a reflexive collective intelligence.
Amazon Price: N/A (as of April 20, 2018 08:41 –
Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory
The purpose of the book is to critically analyze the contributions and challenges that the spread of information technologies can bring to categories of classic strategic theory. In the first two chapters, the author establishes the context of the book, coming back to the epistemology of revolution in military affairs and its terminology. The third chapter examines the political bases of strategic action and operational strategy, before the next two chapters focus on historical construction of the process of getting to know your opponents and the way in which we consider information collection. Chapter 6 returns to the process of “informationalization” in the doctrine of armed forces, especially in Western countries, and methods of conducting network-centric warfare. The final chapter looks at the attempts of Western countries to adapt to the emergence of techno-guerrillas and new forms of hybrid warfare, and the resulting socio-strategic outcomes.
Continue reading “The Art of War in the Network Age: Back to the Future”