Cybersecurity

Author: Peter W. Singer
Publisher: Oxford University Press
ISBN: 9780199918119
Release Date: 2014
Genre: Business & Economics

An authoritative, single-volume introduction to cybersecurity addresses topics ranging from phishing and electrical-grid takedowns to cybercrime and online freedom, sharing illustrative anecdotes to explain how cyberspace security works and what everyday people can do to protect themselves. Simultaneous.

Cyber War Will Not Take Place

Author: Thomas Rid
Publisher: Oxford University Press
ISBN: 9780199365340
Release Date: 2013-09-01
Genre: Political Science

"Cyber war is coming," announced a land-mark RAND report in 1993. In 2005, the U.S. Air Force boasted it would now fly, fight, and win in cyberspace, the "fifth domain" of warfare. This book takes stock, twenty years on: is cyber war really coming? Has war indeed entered the fifth domain? Cyber War Will Not Take Place cuts through the hype and takes a fresh look at cyber security. Thomas Rid argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways. The threat consists of three different vectors: espionage, sabotage, and subversion. The author traces the most significant hacks and attacks, exploring the full spectrum of case studies from the shadowy world of computer espionage and weaponised code. With a mix of technical detail and rigorous political analysis, the book explores some key questions: What are cyber weapons? How have they changed the meaning of violence? How likely and how dangerous is crowd-sourced subversive activity? Why has there never been a lethal cyber attack against a country's critical infrastructure? How serious is the threat of "pure" cyber espionage, of exfiltrating data without infiltrating humans first? And who is most vulnerable: which countries, industries, individuals?

Cyber War

Author: Richard A. Clarke
Publisher: Harper Collins
ISBN: 9780061992391
Release Date: 2010-04-20
Genre: Political Science

Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.

Cybersecurity for Beginners

Author: Raef Meeuwisse
Publisher: Lulu Press, Inc
ISBN: 9781483431222
Release Date: 2015-07-23
Genre: Computers

This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge. ‘The world has changed more in the past 10 years than in any 10 year period in human history... Technology is no longer a peripheral servant, it shapes our daily lives. Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before.’ ALSO featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.

Dark Territory

Author: Fred Kaplan
Publisher: Simon and Schuster
ISBN: 9781476763279
Release Date: 2016-03-01
Genre: Technology & Engineering

“An important, disturbing, and gripping history” (Kirkus Reviews, starred review), the never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invent and employ cyber wars—where every country can be a major power player and every hacker a mass destroyer. In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer security. From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant role, Dark Territory chronicles a little-known past that shines an unsettling light on our future. Fred Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the “information warfare” squads of the military services, and the national security debates in the White House to reveal the details of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning—and (more often than people know) fighting—these wars for decades. “An eye-opening history of our government’s efforts to effectively manage our national security in the face of the largely open global communications network established by the World Wide Web….Dark Territory is a page-turner [and] consistently surprising” (The New York Times).

Cyber Security Essentials

Author: James Graham
Publisher: CRC Press
ISBN: 1439851263
Release Date: 2016-04-19
Genre: Business & Economics

The sophisticated methods used in recent high-profile cyber incidents have driven many to need to understand how such security issues work. Demystifying the complexity often associated with information assurance, Cyber Security Essentials provides a clear understanding of the concepts behind prevalent threats, tactics, and procedures. To accomplish this, the team of security professionals from VeriSign’s iDefense® Security Intelligence Services supply an extensive review of the computer security landscape. Although the text is accessible to those new to cyber security, its comprehensive nature makes it ideal for experts who need to explain how computer security works to non-technical staff. Providing a fundamental understanding of the theory behind the key issues impacting cyber security, the book: Covers attacker methods and motivations, exploitation trends, malicious code techniques, and the latest threat vectors Addresses more than 75 key security concepts in a series of concise, well-illustrated summaries designed for most levels of technical understanding Supplies actionable advice for the mitigation of threats Breaks down the code used to write exploits into understandable diagrams This book is not about the latest attack trends or botnets. It’s about the reasons why these problems continue to plague us. By better understanding the logic presented in these pages, readers will be prepared to transition to a career in the growing field of cyber security and enable proactive responses to the threats and attacks on the horizon.

Wired for War

Author: P. W. Singer
Publisher: Penguin
ISBN: 1440685975
Release Date: 2009-01-22
Genre: Technology & Engineering

P. W. Singer explores the great­est revolution in military affairs since the atom bomb: the dawn of robotic warfare We are on the cusp of a massive shift in military technology that threatens to make real the stuff of I, Robot and The Terminator. Blending historical evidence with interviews of an amaz­ing cast of characters, Singer shows how technology is changing not just how wars are fought, but also the politics, economics, laws, and the ethics that surround war itself. Travelling from the battlefields of Iraq and Afghanistan to modern-day "skunk works" in the midst of suburbia, Wired for War will tantalise a wide readership, from military buffs to policy wonks to gearheads.

The Cybersecurity to English Dictionary

Author: Raef Meeuwisse
Publisher: Lulu Press, Inc
ISBN: 9781483446356
Release Date: 2016-02-18
Genre: Computers

The speed of change in the world of cybersecurity is amazing. If you attend any meeting where cybersecurity is discussed, it can be like listening to a foreign language: blue team, black hat, metamorphic malware, steganography - What are these people talking about? This dictionary began life as the reference section at the back of 'Cybersecurity for Beginners' and has now taken on a life of its own, with hundreds of the primary cybersecurity terms defined. This book is designed to be a useful companion for anyone who wants to keep up on cybersecurity terms or confound others with their understanding. Finally, cybersecurity does not need to sound like a different language.

War

Author: Shane Harris
Publisher: Houghton Mifflin Harcourt
ISBN: 9780544251793
Release Date: 2014
Genre: Computers

An investigation into how the Pentagon, NSA, and other government agencies are uniting with corporations to fight in cyberspace, the next great theater of war.

Inside Cyber Warfare

Author: Jeffrey Carr
Publisher: "O'Reilly Media, Inc."
ISBN: 9781449325459
Release Date: 2011-12-09
Genre: Computers

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries. This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You’ll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. Discover how Russian investment in social networks benefits the Kremlin Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa Explore the rise of anarchist groups such as Anonymous and LulzSec Look inside cyber warfare capabilities of nations including China and Israel Understand how the U.S. can legally engage in covert cyber operations Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations Jeffrey Carr, the founder and CEO of Taia Global, Inc., is a cyber intelligence expert and consultant who specializes in the investigation of cyber attacks against governments and infrastructures by state and non-state hackers.

Cyber Warfare

Author: Jason Andress
Publisher: Elsevier
ISBN: 9780124166332
Release Date: 2013-10-01
Genre: Computers

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts. Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks Dives deeply into relevant technical and factual information from an insider's point of view Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result

Ghost Fleet

Author: P. W. Singer
Publisher: Houghton Mifflin Harcourt
ISBN: 9780544142848
Release Date: 2015-06-30
Genre: Fiction

Two authorities on future warfare join forces to create a taut, convincing novel—set in 2026—about a besieged America battling for its very existence.

Rise of the Machines A Cybernetic History

Author: Thomas Rid
Publisher: W. W. Norton & Company
ISBN: 9780393286014
Release Date: 2016-06-28
Genre: Technology & Engineering

"Dazzling.” —Financial Times As lives offline and online merge even more, it is easy to forget how we got here. Rise of the Machines reclaims the spectacular story of cybernetics, one of the twentieth century’s pivotal ideas. Springing from the mind of mathematician Norbert Wiener amid the devastation of World War II, the cybernetic vision underpinned a host of seductive myths about the future of machines. Cybernetics triggered blissful cults and military gizmos, the Whole Earth Catalog and the air force’s foray into virtual space, as well as crypto-anarchists fighting for internet freedom. In Rise of the Machines, Thomas Rid draws on unpublished sources—including interviews with hippies, anarchists, sleuths, and spies—to offer an unparalleled perspective into our anxious embrace of technology.

Children at War

Author: Peter W. Singer
Publisher: Vintage
ISBN: 9781101970058
Release Date: 2015-03-04
Genre: Political Science

Children at War is the first comprehensive book to examine the growing and global use of children as soldiers. P.W. Singer, an internationally recognized expert in twenty-first-century warfare, explores how a new strategy of war, utilized by armies and warlords alike, has targeted children, seeking to turn them into soldiers and terrorists. Singer writes about how the first American serviceman killed by hostile fire in Afghanistan—a Green Beret—was shot by a fourteen-year-old Afghan boy; how suspected militants detained by U.S. forces in Iraq included more than one hundred children under the age of seventeen; and how hundreds who were taken hostage in Thailand were held captive by the rebel "God's Army," led by twelve-year-old twins. Interweaving the voices of child soldiers throughout the book, Singer looks at the ways these children are recruited, abducted, trained, and finally sent off to fight in war-torn hot spots, from Colombia and the Sudan to Kashmir and Sierra Leone. He writes about children who have been indoctrinated to fight U.S. forces in Iraq and Afghanistan; of Iraqui boys between the ages of ten and fifteen who had been trained in military arms and tactics to become Saddam Hussein's Ashbal Saddam (Lion Cubs); of young refugees from Pakistani madrassahs who were recruited to help bring the Taliban to power in the Afghan civil war. The author, National Security Fellow at the Brookings Institution and director of the Brookings Project on U.S. Policy Towards the Islamic World, explores how this phenomenon has come about, and how social disruptions and failures of development in modern Third World nations have led to greater global conflict and an instability that has spawned a new pool of recruits. He writes about how technology has made today's weapons smaller and lighter and therefore easier for children to carry and handle; how one billion people in the world live in developing countries where civil war is part of everyday life; and how some children—without food, clothing, or family—have volunteered as soldiers as their only way to survive. Finally, Singer makes clear how the U.S. government and the international community must face this new reality of modern warfare, how those who benefit from the recruitment of children as soldiers must be held accountable, how Western militaries must be prepared to face children in battle, and how rehabilitation programs can undo this horrific phenomenon and turn child soldiers back into children.

Beyond Snowden

Author: Timothy H. Edgar
Publisher: Brookings Institution Press
ISBN: 9780815730644
Release Date: 2017-08-29
Genre: Political Science

Safeguarding Our Privacy and Our Values in an Age of Mass Surveillance America’s mass surveillance programs, once secret, can no longer be ignored. While Edward Snowden began the process in 2013 with his leaks of top secret documents, the Obama administration’s own reforms have also helped bring the National Security Agency and its programs of signals intelligence collection out of the shadows. The real question is: What should we do about mass surveillance? Timothy Edgar, a long-time civil liberties activist who worked inside the intelligence community for six years during the Bush and Obama administrations, believes that the NSA’s programs are profound threat to the privacy of everyone in the world. At the same time, he argues that mass surveillance programs can be made consistent with democratic values, if we make the hard choices needed to bring transparency, accountability, privacy, and human rights protections into complex programs of intelligence collection. Although the NSA and other agencies already comply with rules intended to prevent them from spying on Americans, Edgar argues that the rules—most of which date from the 1970s—are inadequate for this century. Reforms adopted during the Obama administration are a good first step but, in his view, do not go nearly far enough. Edgar argues that our communications today—and the national security threats we face—are both global and digital. In the twenty first century, the only way to protect our privacy as Americans is to do a better job of protecting everyone’s privacy. Beyond Surveillance: Privacy, Mass Surveillance, and the Struggle to Reform the NSA explains both why and how we can do this, without sacrificing the vital intelligence capabilities we need to keep ourselves and our allies safe. If we do, we set a positive example for other nations that must confront challenges like terrorism while preserving human rights. The United States already leads the world in mass surveillance. It can lead the world in mass surveillance reform.