Search Results: 'cyber war'

Search

×
×
×
×
54 results for "cyber war"
Cyber Attacks and the Law of War By Michael Gervais
eBook (ePub): $0.00
Download immediately.
This article discuss Cyber Attacks and the law of war. Part I discusses the architecture of cyberspace and how it operates. Part II examines the framework of international humanitarian law and its... More > application to cyber warfare. Ultimately, I contend, the international instruments in place do not answer all the relevant questions that cyber attacks generate. Indeed, they cannot even answer all the questions surrounding the forms of warfare that they were created to govern. However, these international instruments are helpful in determining how cyber attacks ought to be understood under the existing jus ad bellum (use of war) and jus in bello (wartime conduct) frameworks.< Less
Cyber Styletto By Gian DeTorre and Mike Brennan
Paperback: $9.99
Ships in 3-5 business days
Super hacker Yvonne Tran, part of a secret government agency called CyberCom, is brought in to investigate a malicious network attack that caused the deaths of eight innocent people. She and her team... More > follow the trail to Hong Kong and Afghanistan, and they must pinpoint the source before the next attack, which has the potential to kill hundreds of US citizens.< Less
The Cyber Revelation By R. Jackson Abbott
Hardcover: $35.38
Ships in 6-8 business days.
The next world war begins over the Internet. By early summer 2011, Ali Omar, a former U.S. intelligence officer, resurfaces as the leader of a rogue cabal of computer experts operating inside... More > Chechnya. Their creation, The Third Millennium, a computer virus designed to manipulate the Internet and shape a new world destiny, is usurped by a malevolent presence initiating the assault on the Holy Land foretold in biblical prophecies. Unsealing the ancient prophecies, the presence molds the behavior of all who view a computer screen into evil incarnate through the commission of acts of violence. John Granger, a computer forensic specialist with Homeland Security, races against time to locate and eliminate the source of the virus tracing its footprints by deciphering a series of messages deposited on compromised government computers. As he investigates the scenes of the victims of the new cyber-evil, Granger is unaware he has made himself a target for assassination.< Less
The Cyber Revelation By R. Jackson Abbott
eBook (PDF): $3.75
Download immediately.
The next world war begins over the Internet. By early summer 2011, Ali Omar, a former U.S. intelligence officer, resurfaces as the leader of a rogue cabal of computer experts operating inside... More > Chechnya. Their creation, The Third Millennium, a computer virus designed to manipulate the Internet and shape a new world destiny, is usurped by a malevolent presence initiating the assault on the Holy Land foretold in biblical prophecies. Unsealing the ancient prophecies, the presence molds the behavior of all who view a computer screen into evil incarnate through the commission of acts of violence. John Granger, a computer forensic specialist with Homeland Security, races against time to locate and eliminate the source of the virus tracing its footprints by deciphering a series of messages deposited on compromised government computers. As he investigates the scenes of the victims of the new cyber-evil, Granger is unaware he has made himself a target for assassination.< Less
The Cyber Revelation By R. Jackson Abbott
Paperback: $21.50
Ships in 3-5 business days
The next world war begins over the Internet. By early summer 2011, Ali Omar, a former U.S. intelligence officer, resurfaces as the leader of a rogue cabal of computer experts operating inside... More > Chechnya. Their creation, The Third Millennium, a computer virus designed to manipulate the Internet and shape a new world destiny, is usurped by a malevolent presence initiating the assault on the Holy Land foretold in biblical prophecies. Unsealing the ancient prophecies, the presence molds the behavior of all who view a computer screen into evil incarnate through the commission of acts of violence. John Granger, computer forensics expert and special assistant to the Department of Homeland Security, races against time to locate and eliminate the source of the virus tracing its footprints by deciphering a series of messages deposited on compromised government computers. As he investigates the scenes of the victims of the new cyber-evil, Granger is unaware he has made himself a target for assassination.< Less
Cyber Messiah By Duane Fisher
Paperback: $19.05
Ships in 3-5 business days
(1 Ratings)
On a strange station in a sector he had never been to before, Fnord was on the run. He had no idea that he was about to meet a teenage gladiator, a pre pubescent hacker and the most sarcastic robot... More > (ghost) in the galaxy. With the promise of death, capture and war the unlikely team must make their way to Earth. While they are doing so they might want to find out why, and lets not forget that the empire, an evil corporation and every pirate in ten sectors will be searching for them. If only Fnord had friends who could help him out, oh wait a minuet, that’s how this whole mess started in the first place! With thrills spills and all the other things they usually say about this kind of story, Cyber Messiah promises to leave you with a feeling of obscure happiness that you just can’t explain. Although how a book made from paper can make a promise is quite beyond me. Last time I checked books were not sentient. Enjoy :-)< Less
Cyber Messiah By Duane Fisher
eBook (PDF): $0.00
Download immediately.
(1 Ratings)
On a strange station in a sector he had never been to before, Fnord was on the run. He had no idea that he was about to meet a teenage gladiator, a pre pubescent hacker and the most sarcastic robot... More > (ghost) in the galaxy. With the promise of death, capture and war the unlikely team must make their way to Earth. While they are doing so they might want to find out why, and lets not forget that the empire, an evil corporation and every pirate in ten sectors will be searching for them. If only Fnord had friends who could help him out, oh wait a minuet, that’s how this whole mess started in the first place! With thrills spills and all the other things they usually say about this kind of story, Cyber Messiah promises to leave you with a feeling of obscure happiness that you just can’t explain. Although how a book made from paper can make a promise is quite beyond me. Last time I checked books were not sentient. Enjoy :-)< Less
Cyber Infrastructure Protection [Enlarged Edition] By Tarek Saadawi et al.
Paperback: $30.95
Ships in 3-5 business days
This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for a long-term policy and roadmap... More > for cyber security as well as technology challenges. The book is divided into three main parts. The first part deals with strategy and policy issues related to cyber security. It provides a cyber power theory, discussion of Internet survivability as well as large scale data breaches and the role of cyber power in humanitarian assistance. The second part covers social and legal aspects and discusses the attack dynamics of political and religiously motivated hackers. The third part discusses the technical aspects including the resilience of data centers, intrusion detection, and with strong focus on IP-networks.< Less
Cyber Infrastructure Protection: Volume II (Enlarged Edition) By U.S. Army War College, Strategic Studies Institute
Paperback: $29.95
Ships in 3-5 business days
Increased reliance on the Internet and other networked systems raise the risks of cyber attacks that could harm our nation’s cyber infrastructure. The cyber infrastructure encompasses a number... More > of sectors including the nation’s mass transit and other transportation systems, banking and financial systems, factories, energy systems and the electric power grid, and telecommunications, which increasingly rely on a complex array of computer networks, including the public Internet. However, many of these systems and networks were not built and designed with security in mind. Therefore, our cyber infrastructure contains many holes, risks, and vulnerabilities that may enable an attacker to cause damage or disrupt cyber infrastructure operations. Threats to cyber infrastructure safety and security come from hackers, terrorists, criminal groups, and sophisticated organized crime groups; even nation-states and foreign intelligence services conduct cyber warfare.< Less
Cyber Sapiens Clan Book By Elizabeth Valdez
Hardcover: $28.00
Ships in 6-8 business days.
From the far distant future they came to our world in peace, but by our own hands we caused a new war and they are claiming Earth as the final battleground. The Cyber Sapiens clan book has all you... More > need to level the playing field and crush your opponents.< Less