Search Results: 'cyber attacks'

Search

×
×
×
×
71 results for "cyber attacks"
Cyber Attacks and the Law of War By Michael Gervais
eBook (ePub): $0.00
Download immediately.
This article discuss Cyber Attacks and the law of war. Part I discusses the architecture of cyberspace and how it operates. Part II examines the framework of international humanitarian law and its... More > application to cyber warfare. Ultimately, I contend, the international instruments in place do not answer all the relevant questions that cyber attacks generate. Indeed, they cannot even answer all the questions surrounding the forms of warfare that they were created to govern. However, these international instruments are helpful in determining how cyber attacks ought to be understood under the existing jus ad bellum (use of war) and jus in bello (wartime conduct) frameworks.< Less
Cyber Styletto By Gian DeTorre and Mike Brennan
Paperback: $9.99
Ships in 3-5 business days.
Super hacker Yvonne Tran, part of a secret government agency called CyberCom, is brought in to investigate a malicious network attack that caused the deaths of eight innocent people. She and her team... More > follow the trail to Hong Kong and Afghanistan, and they must pinpoint the source before the next attack, which has the potential to kill hundreds of US citizens.< Less
The Cyber Pirates By Jaskaran Singh Puri
Paperback: List Price: $6.00 $5.40 | You Save: 10%
Ships in 3-5 business days.
As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. This book... More > has been developed for a specific audience who have an overwhelming passion in the field of cyber security or cyber crime. This book does not go through all the basic terms & definitions that one must know to study the computing world, but aims to teach you some of the advanced stuff that you can implement in the real world. Start from the basic, get to know the industry & then finally start practising your real-life attacks on networks & applications. Learn new ways to exploit applications, initiate attacks & protect your identity. This is the perfect guide who wants to try hacking for the first time or someone who wants to improve their skills & learn the practical stuff.< Less
Cyber Warfare North Korea, Hack, Attack, Wack, International Law, Cybersecurity By Journal of Law and Cyber Warfare
Paperback: List Price: $10.00 $8.00 | You Save: 20%
Ships in 3-5 business days.
The Journal of Law & Cyber Warfare provides a public peer-reviewed professional forum for the open discussion and education of technology, business, legal, and military professionals concerning... More > the legal issues businesses and governments arising out of cyber attacks or acts of cyber war. The Journal of Law and Cyber Warfare is published twice per year by top legal professionals and scholars from the law, technology, security, and business industries. The views expressed in the Journal of Law and Cyber Warfare are those of the authors and not necessarily of the Journal of Law and Cyber Warfare.< Less
Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology By Subcommittee on Oversight and Investigations of the Committee on Foreign Affairs House of Representatives
eBook (ePub): $8.99
Download immediately.
The United States is under attack. Cyber-attack and cyber-espionage traced backed to China have been dramatically increasing every year. What kind of damage is being done? How is our national... More > security being compromised? The Office of the Secretary of Defense in their 2010 annual report to Congress, which was the "Military and Security Developments Involving the People's Republic of China [PRC]"; outlined this challenge: "The PRC utilizes a large well-organized network of enterprises, defense factories and affiliated research institutes and computer network operations to facilitate the collection of sensitive information and export-controlled technology." The heavy use of outsourcing of computer and consumer electronic production to China, not only by American but also by Japanese, Taiwanese, German, and South Korean firms, has helped create a Chinese cyber threat that now compromises the security of the Western world.< Less
Cyber Infrastructure Protection By Tarek N. Saadawi, Louis H. Jordan Jr.
Paperback: $25.97
Ships in 3-5 business days.
This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a... More > roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection. The book is divided into three main parts. Part I deals with strategy and policy issues related to cyber security. It provides a theory of cyberpower, a discussion of Internet survivability as well as large scale data breaches and the role of cyberpower in humanitarian assistance. Part II covers social and legal aspects of cyber infrastructure protection and it provides discussions concernsing the attack dynamics of politically and religiously motivated hackers. Part III discusses the technical aspects of cyber infrastructure protection including the resilience of data centers, intrusion detection, and a strong focus on IP-networks.(Originally published by the Strategic Studies Institute)< Less
Small Business Cyber Planner By American Government
eBook (ePub): $0.99
Download immediately.
This planning guide is designed to meet the specific needs of your company, using the FCC’s customizable Small Biz Cyber Planner tool. The tool is designed for businesses that lack the... More > resources to hire dedicated staff to protect their business, information and customers from cyber threats. Even a business with one computer or one credit card terminal can benefit from this important tool. We generally recommend that businesses using more sophisticated networks with dozens of computers consult a cyber security expert in addition to using the cyber planner. The FCC provides no warranties with respect to the guidance provided by this tool and is not responsible for any harm that might occur as a result of or in spite of its use.< Less
An Introduction to Cyber Security By Kevin Westwood
eBook (PDF): $9.96
Download immediately.
As we spend more and more of our time using online services, so do we find ourselves increasingly open to attack. Cyber threats against individuals, governments, and businesses are continually... More > taking on newer, more complex, and more dangerous forms. Currently, highly skilled and, highly motivated cyber attackers around the world are in the process of crafting revolutionary attack methods to counter the latest cyber-security innovations.< Less
Dark Guest Training Games for Cyber Warfare Volume 1 Wargaming Internet Based Attacks By John Curry, Tim Price MBE
Paperback: $22.37
Ships in 3-5 business days.
Dark Guest contains five separate games for use in education about cyber warfare and information security. The games cover a range of topics from defending a single company to an exercise about a... More > nation state under cyber based attack. The games include: Enterprise Defender: Protecting a Modern Business All Your Secrets Are Belong to Us: a Matrix Game Conspiracy! The Card Game Media Wars: The Battle to Dominate the Information Space Tallinn Soldier: A Sample National Crisis Game Based in Estonia in 2007 The authors have many years experience in information management, cyber warfare and game design. John Curry is an academic and editor of the History of Wargaming Project. Tim Price MBE is an army officer with over 25 years experience in simulation and gaming. Together they bring their experience together to create a valuable resource for education and training.< Less
Cyber Terrorism: A Guide for Facility Managers By Joseph F. Gustin
eBook (ePub): $48.99
Download immediately.
In the current climate of terrorism, the facility manager is in a more critical position than ever before. Protecting the organization's infrastructure from cyber-based attacks that are designed to... More > disrupt and/or destroy business operations is becoming increasingly important for facility managers. Renowned author and instructor, Joseph F. Gustin (author of Disaster & Recovery Planning), in this new timely book, addresses cyber terrorism and other forms of terrorist activity, including mailroom security, bomb threats, and the constant attack from viruses, hackers and other invasive programs. Also covered in detail are the necessary steps for prevention, how to assess vulnerability, emergency preparedness, prevention strategies, and incident response and recovery.< Less