Search Results: 'cyber attacks'

Search

×
×
×
×
64 results for "cyber attacks"
Cyber Attacks and the Law of War By Michael Gervais
eBook (ePub): $0.00
Download immediately.
This article discuss Cyber Attacks and the law of war. Part I discusses the architecture of cyberspace and how it operates. Part II examines the framework of international humanitarian law and its... More > application to cyber warfare. Ultimately, I contend, the international instruments in place do not answer all the relevant questions that cyber attacks generate. Indeed, they cannot even answer all the questions surrounding the forms of warfare that they were created to govern. However, these international instruments are helpful in determining how cyber attacks ought to be understood under the existing jus ad bellum (use of war) and jus in bello (wartime conduct) frameworks.< Less
Cyber Styletto By Gian DeTorre and Mike Brennan
Paperback: $9.99
Ships in 3-5 business days
Super hacker Yvonne Tran, part of a secret government agency called CyberCom, is brought in to investigate a malicious network attack that caused the deaths of eight innocent people. She and her team... More > follow the trail to Hong Kong and Afghanistan, and they must pinpoint the source before the next attack, which has the potential to kill hundreds of US citizens.< Less
Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology By Subcommittee on Oversight and Investigations of the Committee on Foreign Affairs House of Representatives
eBook (ePub): $8.99
Download immediately.
The United States is under attack. Cyber-attack and cyber-espionage traced backed to China have been dramatically increasing every year. What kind of damage is being done? How is our national... More > security being compromised? The Office of the Secretary of Defense in their 2010 annual report to Congress, which was the "Military and Security Developments Involving the People's Republic of China [PRC]"; outlined this challenge: "The PRC utilizes a large well-organized network of enterprises, defense factories and affiliated research institutes and computer network operations to facilitate the collection of sensitive information and export-controlled technology." The heavy use of outsourcing of computer and consumer electronic production to China, not only by American but also by Japanese, Taiwanese, German, and South Korean firms, has helped create a Chinese cyber threat that now compromises the security of the Western world.< Less
Cyber Infrastructure Protection By Tarek N. Saadawi, Louis H. Jordan Jr.
Paperback: $25.97
Ships in 3-5 business days
This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a... More > roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyberpower, a discussion of Internet survivability as well as large scale data breaches and the role of cyberpower in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concernsing the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.(Originally published by the Strategic Studies Institute)< Less
Small Business Cyber Planner By American Government
eBook (ePub): $0.99
Download immediately.
This planning guide is designed to meet the specific needs of your company, using the FCC’s customizable Small Biz Cyber Planner tool. The tool is designed for businesses that lack the... More > resources to hire dedicated staff to protect their business, information and customers from cyber threats. Even a business with one computer or one credit card terminal can benefit from this important tool. We generally recommend that businesses using more sophisticated networks with dozens of computers consult a cyber security expert in addition to using the cyber planner. The FCC provides no warranties with respect to the guidance provided by this tool and is not responsible for any harm that might occur as a result of or in spite of its use.< Less
Spynet "-" the Cyber Drone By David Agam
eBook (ePub): $3.99
Download immediately.
MARK MOULIN, CEO of Moulin Enterprises, invents and builds the first prototype of the quantum computer with his son, FRANK. A Marine Drone having advanced technology unlike anything else before... More > taking us into the future of complex espionage no one is able to stop it. It's about to change the rules. In a turn of events, Mark Moulin and his accusatives disappeared without a trace. The LZE Corporation and its most ruthless and lethal CEO, launched two satellites from the Sichuan Province in China. The Navy and Military came under cyber-attack. TOM KITTRIDGE is the Commander of the French Secret Service in Lancelot, the home of the DGSE, near Langley, Virginia. TOM KITTRIDGE, and his highly trained top operative, ALEXIA PALMER, go all in with an offensive operation. Their heroic adventures take place in the depth of the ocean, in the air, and in the heart of China. They unravel high-end political and military affairs, while setting new standards for the world intelligence communities.< Less
Dark Guest Training Games for Cyber Warfare Volume 1 Wargaming Internet Based Attacks By John Curry, Tim Price MBE
Paperback: $22.37
Ships in 3-5 business days
Dark Guest contains five separate games for use in education about cyber warfare and information security. The games cover a range of topics from defending a single company to an exercise about a... More > nation state under cyber based attack. The games include: Enterprise Defender: Protecting a Modern Business All Your Secrets Are Belong to Us: a Matrix Game Conspiracy! The Card Game Media Wars: The Battle to Dominate the Information Space Tallinn Soldier: A Sample National Crisis Game Based in Estonia in 2007 The authors have many years experience in information management, cyber warfare and game design. John Curry is an academic and editor of the History of Wargaming Project. Tim Price MBE is an army officer with over 25 years experience in simulation and gaming. Together they bring their experience together to create a valuable resource for education and training.< Less
Cyber Terrorism: A Guide for Facility Managers By Joseph F. Gustin
eBook (ePub): $48.99
Download immediately.
In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to... More > disrupt and/or destroy business operations is becoming increasingly important for facility managers. Renowned author and instructor, Joseph F. Gustin (author of Disaster & Recovery Planning), in this new timely book, addresses cyber terrorism and other forms of terrorist activity, including mailroom security, bomb threats, and the constant attack from viruses, hackers and other invasive programs. Also covered in detail are the necessary steps for prevention, how to assess vulnerability, emergency preparedness, prevention strategies, and incident response and recovery.< Less
Cyber Infrastructure Protection [Enlarged Edition] By Tarek Saadawi et al.
Paperback: $30.95
Ships in 3-5 business days
This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for a long-term policy and roadmap... More > for cyber security as well as technology challenges. The book is divided into three main parts. The first part deals with strategy and policy issues related to cyber security. It provides a cyber power theory, discussion of Internet survivability as well as large scale data breaches and the role of cyber power in humanitarian assistance. The second part covers social and legal aspects and discusses the attack dynamics of political and religiously motivated hackers. The third part discusses the technical aspects including the resilience of data centers, intrusion detection, and with strong focus on IP-networks.< Less
Proceedings of 2007 Cyber Security and Information Infrastructure Workshop By Frederick Sheldon et al.
eBook (PDF): $0.00
Download immediately.
Workshop goal was to challenge, establish and debate a far-reaching discussion that broadly and comprehensively outlines a strategy for cyber security that is founded on sound technologies for better... More > understanding of existing and emerging threats; advances in insider threat detection, deterrence, mitigation and threat elimination; ensuring security, survivability and dependability of critical infrastructures; guaranteeing availability of time-critical scalably secure systems; observable measurable certifiable security effects, rather than hypothesized causes; quantitative metrics that enable us to specify security requirements, formulate security claims, and certify security properties; solutions that provide a measure of assurance against known and unknown (though perhaps pre-modeled) threats; mission fulfillment, whether or not security violations have taken place rather than mitigating all violations indiscriminately.< Less