Search Results: 'cyber attacks'

Search

×
×
×
×
74 results for "cyber attacks"
Cyber Attacks and the Law of War By Michael Gervais
eBook (ePub): $0.00
This article discuss Cyber Attacks and the law of war. Part I discusses the architecture of cyberspace and how it operates. Part II examines the framework of international humanitarian law and its... More > application to cyber warfare. Ultimately, I contend, the international instruments in place do not answer all the relevant questions that cyber attacks generate. Indeed, they cannot even answer all the questions surrounding the forms of warfare that they were created to govern. However, these international instruments are helpful in determining how cyber attacks ought to be understood under the existing jus ad bellum (use of war) and jus in bello (wartime conduct) frameworks.< Less
Cyber Attack Threat Trends: Stuxnet By Harrison Dreggs et al.
Paperback: List Price: $30.00 $18.00 | You Save: 40%
Prints in 3-5 business days
(2 Ratings)
An examination of cyber attack threat trends including Stuxnet. With background on advanced persistent threats, cyber electronic warfare, cyber security standards, cyber-attacks, cyberterrorism,... More > Operation High Roller, Operation Merlin, Operation Olympic Games, Siberian pipeline sabotage, Tailored Access Operations, and vulnerability of nuclear plants to attack.< Less
Cyber Styletto By Gian DeTorre and Mike Brennan
Paperback: $9.99
Prints in 3-5 business days
Super hacker Yvonne Tran, part of a secret government agency called CyberCom, is brought in to investigate a malicious network attack that caused the deaths of eight innocent people. She and her team... More > follow the trail to Hong Kong and Afghanistan, and they must pinpoint the source before the next attack, which has the potential to kill hundreds of US citizens.< Less
Cyber Security By B.Nandhakumar
eBook (PDF): $8.99
Understanding and preventing cybercrime in its many forms requires basic knowledge about ways in which traditional crimes are becoming increasingly high tech and complex. A person does not need any... More > prior education in computer science, software engineering, or network administration to understand, enjoy, and use this reference work. However, the book is written as an authoritative source of information inclusive of discussions about all major types of cybercrime offending victimization sure to be of interest to parents, teachers, security professionals, managers of organizations, and public policy officials. This book is written for general readers, students who want to learn about hackers and crackers, and business leaders who want to become more knowledgeable about the IT security field to keep their enterprises financially stable and to be proactive against intrusive cyber-attackers.< Less
Cyber Warfare North Korea, Hack, Attack, Wack, International Law, Cybersecurity By Journal of Law and Cyber Warfare
Paperback: List Price: $10.00 $5.00 | You Save: 50%
Prints in 3-5 business days
The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning... More > the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries. The views expressed in the Journal of Law and Cyber Warfare are those of the authors and not necessarily of the Journal of Law and Cyber Warfare.< Less
"110 pages on cyber attacks"-"are we really secure" By Prithviraj Gohel & Dixita Raiyani
eBook (PDF): $0.00
(1 Ratings)
As the usage of technology increased from centuries to centuries it gave benefits to mankind, yet as there is two sides of everything technology also has its good and bad side which depends on how it... More > is used either for construction or for destruction. No doubt there are people who misuse it. We are talking about the increasing amount of “Cyber Attacks” happening rapidly. From the time the computer especially the internet era began people learnt about hacking i.e. to enter another person’s system illegally and from which cyber-attacks took birth. All this made me compelled to write “150 pages of cyberattacks” because my fellow humans should also be aware about different cyber-attacks. It will make people aware about different hacking attacks and everyone including your little ones could know from learning phase so their future will get secured and they are already prepared if any future cyber-attacks affect the world< Less
Cyber Attack Threat Trends: Duqu/Duqu 2.0 By Harrison Dreggs et al.
Paperback: List Price: $30.00 $18.00 | You Save: 40%
Prints in 3-5 business days
(1 Ratings)
An examination of cyber attack threat trends including Duqu and Duqu 2.0. With background on advanced persistent threats, cyber electronic warfare, cyber security standards, cyber-attacks,... More > cyberterrorism, Operation High Roller, Operation Merlin, Operation Olympic Games, Siberian pipeline sabotage, Stuxnet, Tailored Access Operations, and vulnerability of nuclear plants to attack.< Less
Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology By Subcommittee on Oversight and Investigations of the Committee on Foreign Affairs House of Representatives
eBook (ePub): $8.99
The United States is under attack. Cyber-attack and cyber-espionage traced backed to China have been dramatically increasing every year. What kind of damage is being done? How is our national... More > security being compromised? The Office of the Secretary of Defense in their 2010 annual report to Congress, which was the "Military and Security Developments Involving the People's Republic of China [PRC]"; outlined this challenge: "The PRC utilizes a large well-organized network of enterprises, defense factories and affiliated research institutes and computer network operations to facilitate the collection of sensitive information and export-controlled technology." The heavy use of outsourcing of computer and consumer electronic production to China, not only by American but also by Japanese, Taiwanese, German, and South Korean firms, has helped create a Chinese cyber threat that now compromises the security of the Western world.< Less
An Introduction to Cyber Security By Kevin Westwood
eBook (PDF): $9.96
As we spend more and more of our time using online services, so do we find ourselves increasingly open to attack. Cyber threats against individuals, governments, and businesses are continually... More > taking on newer, more complex, and more dangerous forms. Currently, highly skilled and, highly motivated cyber attackers around the world are in the process of crafting revolutionary attack methods to counter the latest cyber-security innovations.< Less
Computer Network and Cyber-security By David
Paperback: $60.94
Prints in 3-5 business days
Cybersecurity is the body of technologies, processes and practices designed to protect networks, computers, programs and data from attack, damage or unauthorized access. In a computing context,... More > security includes both cybersecurity and physical security< Less

Top 10

see more >
 
 
 
 
 
 
 
4