Search Results: 'cyber attacks'

Search

×
×
×
×
74 results for "cyber attacks"
Cyber Attacks and the Law of War By Michael Gervais
eBook (ePub): $0.00
Download immediately.
This article discuss Cyber Attacks and the law of war. Part I discusses the architecture of cyberspace and how it operates. Part II examines the framework of international humanitarian law and its... More > application to cyber warfare. Ultimately, I contend, the international instruments in place do not answer all the relevant questions that cyber attacks generate. Indeed, they cannot even answer all the questions surrounding the forms of warfare that they were created to govern. However, these international instruments are helpful in determining how cyber attacks ought to be understood under the existing jus ad bellum (use of war) and jus in bello (wartime conduct) frameworks.< Less
Cyber Attack Threat Trends: Stuxnet By Harrison Dreggs, Ted Hobson, Xavier Hollenbeck
Paperback: List Price: $30.00 $18.00 | You Save: 40%
Ships in 3-5 business days.
(2 Ratings)
An examination of cyber attack threat trends including Stuxnet. With background on advanced persistent threats, cyber electronic warfare, cyber security standards, cyber-attacks, cyberterrorism,... More > Operation High Roller, Operation Merlin, Operation Olympic Games, Siberian pipeline sabotage, Tailored Access Operations, and vulnerability of nuclear plants to attack.< Less
Cyber Styletto By Gian DeTorre and Mike Brennan
Paperback: $9.99
Ships in 3-5 business days.
Super hacker Yvonne Tran, part of a secret government agency called CyberCom, is brought in to investigate a malicious network attack that caused the deaths of eight innocent people. She and her team... More > follow the trail to Hong Kong and Afghanistan, and they must pinpoint the source before the next attack, which has the potential to kill hundreds of US citizens.< Less
Cyber Warfare North Korea, Hack, Attack, Wack, International Law, Cybersecurity By Journal of Law and Cyber Warfare
Paperback: List Price: $10.00 $8.00 | You Save: 20%
Ships in 3-5 business days.
The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning... More > the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries. The views expressed in the Journal of Law and Cyber Warfare are those of the authors and not necessarily of the Journal of Law and Cyber Warfare.< Less
Cyber Attack Threat Trends: Duqu/Duqu 2.0 By Harrison Dreggs, Ted Hobson, Xavier Hollenbeck
Paperback: List Price: $30.00 $18.00 | You Save: 40%
Ships in 3-5 business days.
(1 Ratings)
An examination of cyber attack threat trends including Duqu and Duqu 2.0. With background on advanced persistent threats, cyber electronic warfare, cyber security standards, cyber-attacks,... More > cyberterrorism, Operation High Roller, Operation Merlin, Operation Olympic Games, Siberian pipeline sabotage, Stuxnet, Tailored Access Operations, and vulnerability of nuclear plants to attack.< Less
Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology By Subcommittee on Oversight and Investigations of the Committee on Foreign Affairs House of Representatives
eBook (ePub): $8.99
Download immediately.
The United States is under attack. Cyber-attack and cyber-espionage traced backed to China have been dramatically increasing every year. What kind of damage is being done? How is our national... More > security being compromised? The Office of the Secretary of Defense in their 2010 annual report to Congress, which was the "Military and Security Developments Involving the People's Republic of China [PRC]"; outlined this challenge: "The PRC utilizes a large well-organized network of enterprises, defense factories and affiliated research institutes and computer network operations to facilitate the collection of sensitive information and export-controlled technology." The heavy use of outsourcing of computer and consumer electronic production to China, not only by American but also by Japanese, Taiwanese, German, and South Korean firms, has helped create a Chinese cyber threat that now compromises the security of the Western world.< Less
Small Business Cyber Planner By American Government
eBook (ePub): $0.99
Download immediately.
This planning guide is designed to meet the specific needs of your company, using the FCC’s customizable Small Biz Cyber Planner tool. The tool is designed for businesses that lack the... More > resources to hire dedicated staff to protect their business, information and customers from cyber threats. Even a business with one computer or one credit card terminal can benefit from this important tool. We generally recommend that businesses using more sophisticated networks with dozens of computers consult a cyber security expert in addition to using the cyber planner. The FCC provides no warranties with respect to the guidance provided by this tool and is not responsible for any harm that might occur as a result of or in spite of its use.< Less
An Introduction to Cyber Security By Kevin Westwood
eBook (PDF): $9.96
Download immediately.
As we spend more and more of our time using online services, so do we find ourselves increasingly open to attack. Cyber threats against individuals, governments, and businesses are continually... More > taking on newer, more complex, and more dangerous forms. Currently, highly skilled and, highly motivated cyber attackers around the world are in the process of crafting revolutionary attack methods to counter the latest cyber-security innovations.< Less
Dark Guest Training Games for Cyber Warfare Volume 1 Wargaming Internet Based Attacks By John Curry, Tim Price MBE
Paperback: $22.37
Ships in 3-5 business days.
Dark Guest contains five separate games for use in education about cyber warfare and information security. The games cover a range of topics from defending a single company to an exercise about a... More > nation state under cyber based attack. The games include: Enterprise Defender: Protecting a Modern Business All Your Secrets Are Belong to Us: a Matrix Game Conspiracy! The Card Game Media Wars: The Battle to Dominate the Information Space Tallinn Soldier: A Sample National Crisis Game Based in Estonia in 2007 The authors have many years experience in information management, cyber warfare and game design. John Curry is an academic and editor of the History of Wargaming Project. Tim Price MBE is an army officer with over 25 years experience in simulation and gaming. Together they bring their experience together to create a valuable resource for education and training.< Less
Cyber Terrorism: A Guide for Facility Managers By Joseph F. Gustin
eBook (ePub): $48.99
Download immediately.
In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to... More > disrupt and/or destroy business operations is becoming increasingly important for facility managers. Renowned author and instructor, Joseph F. Gustin (author of Disaster & Recovery Planning), in this new timely book, addresses cyber terrorism and other forms of terrorist activity, including mailroom security, bomb threats, and the constant attack from viruses, hackers and other invasive programs. Also covered in detail are the necessary steps for prevention, how to assess vulnerability, emergency preparedness, prevention strategies, and incident response and recovery.< Less