Search Results: 'cyber attacks'

Search

×
×
×
×
78 results for "cyber attacks"
Cyber Attacks and the Law of War By Michael Gervais
eBook (ePub): $0.00
This article discuss Cyber Attacks and the law of war. Part I discusses the architecture of cyberspace and how it operates. Part II examines the framework of international humanitarian law and its... More > application to cyber warfare. Ultimately, I contend, the international instruments in place do not answer all the relevant questions that cyber attacks generate. Indeed, they cannot even answer all the questions surrounding the forms of warfare that they were created to govern. However, these international instruments are helpful in determining how cyber attacks ought to be understood under the existing jus ad bellum (use of war) and jus in bello (wartime conduct) frameworks.< Less
Cyber Attack Threat Trends: Stuxnet By Harrison Dreggs, Ted Hobson, Xavier Hollenbeck
Paperback: List Price: $30.00 $18.00 | You Save: 40%
Prints in 3-5 business days
(2 Ratings)
An examination of cyber attack threat trends including Stuxnet. With background on advanced persistent threats, cyber electronic warfare, cyber security standards, cyber-attacks, cyberterrorism,... More > Operation High Roller, Operation Merlin, Operation Olympic Games, Siberian pipeline sabotage, Tailored Access Operations, and vulnerability of nuclear plants to attack.< Less
Grid Attack Cyber War - The Trilogy By Emerson Hawk
Paperback: $9.99
Prints in 3-5 business days
War. Here. Now. Anthony and Katherine had heard of Cyber War before, but never thought they would have to figure out how to live through it taking down the grid. Chaos comes fast as people quickly... More > realize the world has changed for good. But the battle also brews for Kat and Tony as they struggle with deciding whether to stay or go. Will they bug in and try to make things work in the city? Or will they leave in time to make it out, away from the mayhem? Tony and Kat learn the hard way that there is no such thing as safe in the new world they live in. But there is hope in new friends that no longer are strangers. As they try to navigate their new surroundings, it's only a matter of time before they have to make a stand.< Less
Grid Attack Cyber War Book One By Emerson Hawk
eBook (ePub): $0.00
Part 1 of 3 Tony and Katherine had heard of Cyber War before, but never thought they would have to figure out how to live through it taking down the grid. Chaos comes fast as people quickly... More > realize the world has changed for good. But the battle also brews for Kat and Tony as they struggle with deciding whether to stay in the city or go to Kat's mom's in the country. Will they bug in and try to make things work in the city? Or will they leave in time to make it out, away from the mayhem?< Less
Grid Attack Cyber War Book Two By Emerson Hawk
eBook (ePub): $2.99
Part 2 of 3 Nothing is worse than trying to make the right decision when anything you choose could lead you to your death. That's what Kat and Tony are faced with in this new world without power... More > or communications. They know they need to escape the city, but are unsure of how to do it until being forced to move out in a hurry. Will they make it out alive?< Less
Grid Attack Cyber War Book Three By Emerson Hawk
eBook (ePub): $2.99
They thought they had made it to safety once they escaped the city, but they were wrong. Tony and Kat learn the hard way that there is no such things as safe in the new world they live in. But... More > there is hope in new friends that no longer are strangers. As they try to navigate their new surroundings, it's only a matter of time before they have to make a stand.< Less
Cyber Styletto By Gian DeTorre and Mike Brennan
Paperback: $9.99
Prints in 3-5 business days
Super hacker Yvonne Tran, part of a secret government agency called CyberCom, is brought in to investigate a malicious network attack that caused the deaths of eight innocent people. She and her team... More > follow the trail to Hong Kong and Afghanistan, and they must pinpoint the source before the next attack, which has the potential to kill hundreds of US citizens.< Less
Cyber Warfare North Korea, Hack, Attack, Wack, International Law, Cybersecurity By Journal of Law and Cyber Warfare
Paperback: List Price: $10.00 $8.00 | You Save: 20%
Prints in 3-5 business days
The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning... More > the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries. The views expressed in the Journal of Law and Cyber Warfare are those of the authors and not necessarily of the Journal of Law and Cyber Warfare.< Less
Cyber Attack Threat Trends: Duqu/Duqu 2.0 By Harrison Dreggs, Ted Hobson, Xavier Hollenbeck
Paperback: List Price: $30.00 $18.00 | You Save: 40%
Prints in 3-5 business days
(1 Ratings)
An examination of cyber attack threat trends including Duqu and Duqu 2.0. With background on advanced persistent threats, cyber electronic warfare, cyber security standards, cyber-attacks,... More > cyberterrorism, Operation High Roller, Operation Merlin, Operation Olympic Games, Siberian pipeline sabotage, Stuxnet, Tailored Access Operations, and vulnerability of nuclear plants to attack.< Less
Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology By Subcommittee on Oversight and Investigations of the Committee on Foreign Affairs House of Representatives
eBook (ePub): $8.99
The United States is under attack. Cyber-attack and cyber-espionage traced backed to China have been dramatically increasing every year. What kind of damage is being done? How is our national... More > security being compromised? The Office of the Secretary of Defense in their 2010 annual report to Congress, which was the "Military and Security Developments Involving the People's Republic of China [PRC]"; outlined this challenge: "The PRC utilizes a large well-organized network of enterprises, defense factories and affiliated research institutes and computer network operations to facilitate the collection of sensitive information and export-controlled technology." The heavy use of outsourcing of computer and consumer electronic production to China, not only by American but also by Japanese, Taiwanese, German, and South Korean firms, has helped create a Chinese cyber threat that now compromises the security of the Western world.< Less