Search Results: 'cyber attacks'

Search

×
×
×
×
90 results for "cyber attacks"
Cyber Attacks and the Law of War By Michael Gervais
eBook (ePub): $0.00
This article discuss Cyber Attacks and the law of war. Part I discusses the architecture of cyberspace and how it operates. Part II examines the framework of international humanitarian law and its... More > application to cyber warfare. Ultimately, I contend, the international instruments in place do not answer all the relevant questions that cyber attacks generate. Indeed, they cannot even answer all the questions surrounding the forms of warfare that they were created to govern. However, these international instruments are helpful in determining how cyber attacks ought to be understood under the existing jus ad bellum (use of war) and jus in bello (wartime conduct) frameworks.< Less
Cyber Attack Threat Trends: Stuxnet By Harrison Dreggs et al.
Paperback: List Price: $30.00 $18.00 | You Save: 40%
Prints in 3-5 business days
(2 Ratings)
An examination of cyber attack threat trends including Stuxnet. With background on advanced persistent threats, cyber electronic warfare, cyber security standards, cyber-attacks, cyberterrorism,... More > Operation High Roller, Operation Merlin, Operation Olympic Games, Siberian pipeline sabotage, Tailored Access Operations, and vulnerability of nuclear plants to attack.< Less
Cyber Styletto By Gian DeTorre and Mike Brennan
Paperback: $9.99
Prints in 3-5 business days
Super hacker Yvonne Tran, part of a secret government agency called CyberCom, is brought in to investigate a malicious network attack that caused the deaths of eight innocent people. She and her team... More > follow the trail to Hong Kong and Afghanistan, and they must pinpoint the source before the next attack, which has the potential to kill hundreds of US citizens.< Less
Cyber Fire By Dave Holman
Hardcover: $32.16
Prints in 3-5 business days
Economic and ecological disasters converge as cyber attacks disable the US electric grid and an unlikely team of heroes races against time as heat stroke and chaos set in. Leah Brooks, a renowned... More > climate scientist, goes on an Arctic mission that makes a fearful discovery and then goes terribly wrong. John Gonzalez' financial firm is hacked and he decides whether to trust a beautiful Chinese defector who may hold the key. Earl Miller is a cantankerous retiree outside Phoenix who opens his solar-powered home when all else is dark as lawlessness descends on the city.< Less
Cyber Security By B.Nandhakumar
eBook (PDF): $8.99
Understanding and preventing cybercrime in its many forms requires basic knowledge about ways in which traditional crimes are becoming increasingly high tech and complex. A person does not need any... More > prior education in computer science, software engineering, or network administration to understand, enjoy, and use this reference work. However, the book is written as an authoritative source of information inclusive of discussions about all major types of cybercrime offending victimization sure to be of interest to parents, teachers, security professionals, managers of organizations, and public policy officials. This book is written for general readers, students who want to learn about hackers and crackers, and business leaders who want to become more knowledgeable about the IT security field to keep their enterprises financially stable and to be proactive against intrusive cyber-attackers.< Less
Cyber Warfare North Korea, Hack, Attack, Wack, International Law, Cybersecurity By Journal of Law and Cyber Warfare
Paperback: List Price: $10.00 $5.00 | You Save: 50%
Prints in 3-5 business days
The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning... More > the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries. The views expressed in the Journal of Law and Cyber Warfare are those of the authors and not necessarily of the Journal of Law and Cyber Warfare.< Less
"110 pages on cyber attacks"-"are we really secure" By Prithviraj Gohel & Dixita Raiyani
eBook (PDF): $0.00
(1 Ratings)
As the usage of technology increased from centuries to centuries it gave benefits to mankind, yet as there is two sides of everything technology also has its good and bad side which depends on how it... More > is used either for construction or for destruction. No doubt there are people who misuse it. We are talking about the increasing amount of “Cyber Attacks” happening rapidly. From the time the computer especially the internet era began people learnt about hacking i.e. to enter another person’s system illegally and from which cyber-attacks took birth. All this made me compelled to write “150 pages of cyberattacks” because my fellow humans should also be aware about different cyber-attacks. It will make people aware about different hacking attacks and everyone including your little ones could know from learning phase so their future will get secured and they are already prepared if any future cyber-attacks affect the world< Less
Cyber Attack Threat Trends: Duqu/Duqu 2.0 By Harrison Dreggs et al.
Paperback: List Price: $30.00 $18.00 | You Save: 40%
Prints in 3-5 business days
(1 Ratings)
An examination of cyber attack threat trends including Duqu and Duqu 2.0. With background on advanced persistent threats, cyber electronic warfare, cyber security standards, cyber-attacks,... More > cyberterrorism, Operation High Roller, Operation Merlin, Operation Olympic Games, Siberian pipeline sabotage, Stuxnet, Tailored Access Operations, and vulnerability of nuclear plants to attack.< Less
Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology By Subcommittee on Oversight and Investigations of the Committee on Foreign Affairs House of Representatives
eBook (ePub): $8.99
The United States is under attack. Cyber-attack and cyber-espionage traced backed to China have been dramatically increasing every year. What kind of damage is being done? How is our national... More > security being compromised? The Office of the Secretary of Defense in their 2010 annual report to Congress, which was the "Military and Security Developments Involving the People's Republic of China [PRC]"; outlined this challenge: "The PRC utilizes a large well-organized network of enterprises, defense factories and affiliated research institutes and computer network operations to facilitate the collection of sensitive information and export-controlled technology." The heavy use of outsourcing of computer and consumer electronic production to China, not only by American but also by Japanese, Taiwanese, German, and South Korean firms, has helped create a Chinese cyber threat that now compromises the security of the Western world.< Less
An Introduction to Cyber Security By Kevin Westwood
eBook (PDF): $9.96
As we spend more and more of our time using online services, so do we find ourselves increasingly open to attack. Cyber threats against individuals, governments, and businesses are continually... More > taking on newer, more complex, and more dangerous forms. Currently, highly skilled and, highly motivated cyber attackers around the world are in the process of crafting revolutionary attack methods to counter the latest cyber-security innovations.< Less

Top 10

see more >
 
 
 
 
 
 
 
5
My Wars My Wars By Richard Bushong
Paperback: $14.36
 
 
 
 
7
Vein Book Vein Book By Eric Dohner
Paperback: $10.00
 
 
8
About Face About Face By Eric Dohner
Paperback: $10.00
 
 
9
What May Come What May Come By Robert Grant
Paperback: $12.71
 
 
10