Search Results: 'cyber espionage'

Search

×
×
×
×
12 results for "cyber espionage"
Communist Chinese Cyber-Attacks, Cyber-Espionage and Theft of American Technology By Subcommittee on Oversight and Investigations of the Committee on Foreign Affairs House of Representatives
eBook (ePub): $8.99
The United States is under attack. Cyber-attack and cyber-espionage traced backed to China have been dramatically increasing every year. What kind of damage is being done? How is our national... More > security being compromised? The Office of the Secretary of Defense in their 2010 annual report to Congress, which was the "Military and Security Developments Involving the People's Republic of China [PRC]"; outlined this challenge: "The PRC utilizes a large well-organized network of enterprises, defense factories and affiliated research institutes and computer network operations to facilitate the collection of sensitive information and export-controlled technology." The heavy use of outsourcing of computer and consumer electronic production to China, not only by American but also by Japanese, Taiwanese, German, and South Korean firms, has helped create a Chinese cyber threat that now compromises the security of the Western world.< Less
Cyber Styletto By Gian DeTorre and Mike Brennan
Paperback: $9.99
Prints in 3-5 business days
Super hacker Yvonne Tran, part of a secret government agency called CyberCom, is brought in to investigate a malicious network attack that caused the deaths of eight innocent people. She and her team... More > follow the trail to Hong Kong and Afghanistan, and they must pinpoint the source before the next attack, which has the potential to kill hundreds of US citizens.< Less
Journal of Law & Cyber Warfare: Emerging Issues in Cyber Warfare By Daniel Garrie et al.
Paperback: List Price: $9.99 $7.49 | You Save: 25%
Prints in 3-5 business days
Emerging Issues in Cyber Warfare 2013 Journal of Law & Cyber Warfare, Summer, Volume 2, Issue 1 FOREWORD Cyber Warfare and the Corporate Environment By Chris Colvin, Daniel Garrie, and... More > Siddartha Rao ARTICLES Cyberwarfare: Attribution, Preemption, and National Self Defense. By John Dever and James Dever Cyber Redux: The Schmitt Analysis, Tallinn Manual and US Cyber Policy. By James E. McGhee Is Cyber Espionage a Form of Market Manipulation? By Noah Bledstein< Less
Cyber Infrastructure Protection Volume III By Tarek Investigation & John D. Colwell, Jr.
Paperback: $23.51
Prints in 3-5 business days
Cyberspace, or the Internet, supports important commercial assets as well as non-commercial assets. A hacker, a state or nonstate agent, or a cybercriminal can attack cyberspace for financial,... More > political, or espionage reasons, or to steal identities, or to cause the disruption of critical infrastructure. We have achieved great advancement in computing systems in both hardware and software and their security. On the other hand, we still see massive cyberattacks that result in enormous data losses. Recent attacks have included sophisticated cyberattacks targeting many institutions, including those who provide management and host the core parts of Internet infrastructure. The number and types of attacks, the duration of attacks, and their complexity are all on the rise.< Less
Computer Forensics : A Practical Guide 2019 By Abdul Rahman
eBook (PDF): $24.00
Forensic science is the branch of science that deals to investigate crimes using scientific methods. Whereas digital or computer forensic is the branch of forensic science that used to investigate... More > electronic crimes. Computer forensics involves some techniques to capture important data that would be useful in your reports and reports should be admissible evidence to court. Electronic crimes involves electronic data including money laundering, espionage, piracy theft, extortion, malware attacks, spoofing, key logging. These crimes can be investigated using scientific methods. In this book, data acquisition described, that is the first step in computer forensics. Data acquisition involves bit-streaming which means you can create an image file of your data with the same date and time because using bit-streaming you can’t compromise your evidence.< Less
An Unintended Presidency By Michael Zebrower
eBook (ePub): $3.99
(2 Ratings)
Follow David as his attempt to speak out for his autistic son at a Town Hall meeting leads him on the adventure of a lifetime.
Field of Chaos By Tom Barbalet
Paperback: List Price: $14.20 $9.94 | You Save: 30%
Prints in 3-5 business days
1993 was a busy year. When confronted with his writing in a real form, a young author must look to himself while he survives in a radicalized jungle training camp. He is forced to decide between his... More > fictional account or his real being. Field of Chaos tells two stories and leaves the reader piecing together what is real and what is purely a conspiracy.< Less
Field of Chaos By Tom Barbalet
eBook (PDF): $4.99
1993 was a busy year. When confronted with his writing in a real form, a young author must look to himself while he survives in a radicalized jungle training camp. He is forced to decide between his... More > fictional account or his real being. Field of Chaos tells two stories and leaves the reader piecing together what is real and what is purely a conspiracy.< Less
Computer Forensics : A Practical Guide By Abdul Rahman
Paperback: List Price: $157.94 $78.97 | You Save: 50%
Prints in 3-5 business days
Forensic science is the branch of science that deals to investigate crimes using scientific methods. Whereas digital or computer forensic is the branch of forensic science that used to investigate... More > electronic crimes. Computer forensics involves some techniques to capture important data that would be useful in your reports and reports should be admissible evidence to court. Electronic crimes involves electronic data including money laundering, espionage, piracy theft, extortion, malware attacks, spoofing, key logging.< Less
Running Black By Patrick Todoroff
Paperback: $16.99
Prints in 3-5 business days
(3 Ratings)
It's 2059 and the North Korean mercenary Tam Song heads up Eshu International: a private security team that will take any job for the right price, no questions asked. Based in the Belfast Metro Zone,... More > they're the best black contract outfit on the planet. Stable nano-technology: the melding of man and machine on a microscopic level. It's a break-through worth billions no one's been able to achieve. Until now. The Dawson Hull Conglomerate has finally developed a viable Nanotech Neural Network; an interface system that exponentially increases a person's cyber-capabilities. They're days away from unveiling the prototype to the world. And Eshu International just got hired to steal it.< Less

Top 10

see more >
 
 
 
2
My Wars My Wars By Richard Bushong
Paperback: $14.36
 
 
 
 
 
 
5
Vein Book Vein Book By Eric Dohner
Paperback: $10.00
 
 
6
About Face About Face By Eric Dohner
Paperback: $10.00
 
 
 
 
8
What May Come What May Come By Robert Grant
Paperback: $12.71