Cybersecurity

Author: Peter W. Singer
Publisher: Oxford University Press
ISBN: 9780199918119
Release Date: 2014
Genre: Business & Economics

An authoritative, single-volume introduction to cybersecurity addresses topics ranging from phishing and electrical-grid takedowns to cybercrime and online freedom, sharing illustrative anecdotes to explain how cyberspace security works and what everyday people can do to protect themselves. Simultaneous.

Cybersecurity for Beginners

Author: Raef Meeuwisse
Publisher: Lulu Press, Inc
ISBN: 9781483431222
Release Date: 2015-07-23
Genre: Computers

This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge. ‘The world has changed more in the past 10 years than in any 10 year period in human history... Technology is no longer a peripheral servant, it shapes our daily lives. Companies that can use technology wisely and well are booming, companies that make bad or no technology choices collapse and disappear. The cloud, smart devices and the ability to connect almost any object to the internet are an essential landscape to use but are also fraught with new risks and dangers of a magnitude never seen before.’ ALSO featuring an alphabetical section at the back of the book to help you translate many of the main cybersecurity technical terms into plain, non-technical English.

Cyber War Will Not Take Place

Author: Thomas Rid
Publisher: Oxford University Press, USA
ISBN: 9780199330638
Release Date: 2013
Genre: History

"Published in the United Kingdom in 2013 by C. Hurst & Co. (Publishers) Ltd"--Title page verso.

Cyber War

Author: Richard A. Clarke
Publisher: Harper Collins
ISBN: 9780061992391
Release Date: 2010-04-20
Genre: Political Science

Author of the #1 New York Times bestseller Against All Enemies, former presidential advisor and counter-terrorism expert Richard A. Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.

The Cybersecurity to English Dictionary

Author: Raef Meeuwisse
Publisher: Lulu Press, Inc
ISBN: 9781483446356
Release Date: 2016-02-18
Genre: Computers

The speed of change in the world of cybersecurity is amazing. If you attend any meeting where cybersecurity is discussed, it can be like listening to a foreign language: blue team, black hat, metamorphic malware, steganography - What are these people talking about? This dictionary began life as the reference section at the back of 'Cybersecurity for Beginners' and has now taken on a life of its own, with hundreds of the primary cybersecurity terms defined. This book is designed to be a useful companion for anyone who wants to keep up on cybersecurity terms or confound others with their understanding. Finally, cybersecurity does not need to sound like a different language.

Wired for War

Author: P. W. Singer
Publisher: Penguin
ISBN: 1440685975
Release Date: 2009-01-22
Genre: Technology & Engineering

P. W. Singer explores the great­est revolution in military affairs since the atom bomb: the dawn of robotic warfare We are on the cusp of a massive shift in military technology that threatens to make real the stuff of I, Robot and The Terminator. Blending historical evidence with interviews of an amaz­ing cast of characters, Singer shows how technology is changing not just how wars are fought, but also the politics, economics, laws, and the ethics that surround war itself. Travelling from the battlefields of Iraq and Afghanistan to modern-day "skunk works" in the midst of suburbia, Wired for War will tantalise a wide readership, from military buffs to policy wonks to gearheads.

Ghost Fleet

Author: P. W. Singer
Publisher: Houghton Mifflin Harcourt
ISBN: 9780544142848
Release Date: 2015-06-30
Genre: Fiction

Two authorities on future warfare join forces to create a taut, convincing novel—set in 2026—about a besieged America battling for its very existence.

Rise of the Machines A Cybernetic History

Author: Thomas Rid
Publisher: W. W. Norton & Company
ISBN: 9780393286014
Release Date: 2016-06-28
Genre: Technology & Engineering

"Dazzling.” —Financial Times As lives offline and online merge even more, it is easy to forget how we got here. Rise of the Machines reclaims the spectacular story of cybernetics, one of the twentieth century’s pivotal ideas. Springing from the mind of mathematician Norbert Wiener amid the devastation of World War II, the cybernetic vision underpinned a host of seductive myths about the future of machines. Cybernetics triggered blissful cults and military gizmos, the Whole Earth Catalog and the air force’s foray into virtual space, as well as crypto-anarchists fighting for internet freedom. In Rise of the Machines, Thomas Rid draws on unpublished sources—including interviews with hippies, anarchists, sleuths, and spies—to offer an unparalleled perspective into our anxious embrace of technology.

Dark Territory

Author: Fred Kaplan
Publisher: Simon and Schuster
ISBN: 9781476763279
Release Date: 2016-03-01
Genre: Technology & Engineering

“An important, disturbing, and gripping history” (Kirkus Reviews, starred review), the never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invent and employ cyber wars—where every country can be a major power player and every hacker a mass destroyer. In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer security. From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant role, Dark Territory chronicles a little-known past that shines an unsettling light on our future. Fred Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the “information warfare” squads of the military services, and the national security debates in the White House to reveal the details of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning—and (more often than people know) fighting—these wars for decades. “An eye-opening history of our government’s efforts to effectively manage our national security in the face of the largely open global communications network established by the World Wide Web….Dark Territory is a page-turner [and] consistently surprising” (The New York Times).

The Cybersecurity Dilemma

Author: Ben Buchanan
Publisher: Oxford University Press
ISBN: 9780190694807
Release Date: 2017-02-01
Genre: Political Science

Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.

War

Author: Shane Harris
Publisher: Houghton Mifflin Harcourt
ISBN: 9780544251793
Release Date: 2014
Genre: Computers

An investigation into how the Pentagon, NSA, and other government agencies are uniting with corporations to fight in cyberspace, the next great theater of war.

Children at War

Author: Peter Warren Singer
Publisher: Univ of California Press
ISBN: 0520248767
Release Date: 2006
Genre: History

This is the first comprehensive look at the use of children in contemporary warfare. From U.S. soldiers having to fight children in Afghanistan and Iraq to juvenile terrorists in Sri Lanka to Palestine, the new, younger face of battle is a terrible reality of 21st century warfare. Indeed, the very first American soldier killed by hostile fire in the "War on Terrorism" was shot by a fourteen-year-old Afghan boy. Children at War is the first comprehensive examination of a disturbing and escalating phenomenon: The use of children as soldiers around the globe. Interweaving explanatory narrative with the voices of child soldiers themselves, P.W. Singer, an internationally recognized expert in modern warfare, introduces the brutal reality of conflict, where children are sent off to fight in war-torn hotspots from Colombia and the Sudan to Kashmir and Sierra Leone. He explores the evolution of this phenomenon, how and why children are recruited, indoctrinated, trained, and converted to soldiers and then lays out the consequences for global security, with a special case study on terrorism. With this established, he lays out the responses that can end this horrible practice. What emerges is not only a compelling and clarifying read on the darker reality of modernwarfare, but also a clear and urgent call for action.

Introduction to Computer Networks and Cybersecurity

Author: Chwan-Hwa (John) Wu
Publisher: CRC Press
ISBN: 9781466572140
Release Date: 2016-04-19
Genre: Computers

If a network is not secure, how valuable is it? Introduction to Computer Networks and Cybersecurity takes an integrated approach to networking and cybersecurity, highlighting the interconnections so that you quickly understand the complex design issues in modern networks. This full-color book uses a wealth of examples and illustrations to effectively connect the principles of networks and networking protocols with the relevant cybersecurity issues. Get the Fundamentals of Internet Architecture and the Protocol Layers Organized into six parts, the book walks you through the fundamentals, starting with the way most people first encounter computer networks—through the Internet architecture. Part 1 covers the most important Internet applications and the methods used to develop them. Part 2 discusses the network edge, consisting of hosts, access networks, LANs, and the physical media used with the physical and link layers. Part 3 explores the network core, including packet/circuit switches, routers, and the Internet backbone, and Part 4 examines reliable transport and the management of network congestion. Learn about Malware and Security Systems Building on the concepts and principles, the book then delves into state-of-the-art cybersecurity mechanisms in Part 5. It reviews the types of malware and the various security systems, made up of firewalls, intrusion detection systems, and other components. Crucially, it provides a seamless view of an information infrastructure in which security capabilities are built in rather than treated as an add-on feature. The book closes with a look at emerging technologies, including virtualization and data center and cloud computing unified communication. Understand Cyber Attacks—and What You Can Do to Defend against Them This comprehensive text supplies a carefully designed introduction to both the fundamentals of networks and the latest advances in Internet security. Addressing cybersecurity from an Internet perspective, it prepares you to better understand the motivation and methods of cyber attacks and what you can do to protect the networks and the applications that run on them. Pedagogical Features The book’s modular design offers exceptional flexibility, whether you want to use it for quick reference, self-study, or a wide variety of one- or two-semester courses in computer networks, cybersecurity, or a hybrid of both. Learning goals in each chapter show you what you can expect to learn, and end-of-chapter problems and questions test your understanding. Throughout, the book uses real-world examples and extensive illustrations and screen captures to explain complicated concepts simply and clearly. Ancillary materials, including PowerPoint® animations, are available to instructors with qualifying course adoption.

Inside Cyber Warfare

Author: Jeffrey Carr
Publisher: "O'Reilly Media, Inc."
ISBN: 9781449325459
Release Date: 2011-12-09
Genre: Computers

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries. This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You’ll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. Discover how Russian investment in social networks benefits the Kremlin Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa Explore the rise of anarchist groups such as Anonymous and LulzSec Look inside cyber warfare capabilities of nations including China and Israel Understand how the U.S. can legally engage in covert cyber operations Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations Jeffrey Carr, the founder and CEO of Taia Global, Inc., is a cyber intelligence expert and consultant who specializes in the investigation of cyber attacks against governments and infrastructures by state and non-state hackers.

The Modern Mercenary

Author: Associate Professor National Defense University Sean McFate
Publisher: Oxford University Press
ISBN: 9780190621087
Release Date: 2016-12-01
Genre:

It was 2004, and Sean McFate had a mission in Burundi: to keep the president alive and prevent the country from spiraling into genocide, without anyone knowing that the United States was involved. The United States was, of course, involved, but only through McFate's employer, the military contractor DynCorp International. Throughout the world, similar scenarios are playing out daily. The United States can no longer go to war without contractors. Yet we don't know much about the industry's structure, its operations, or where it's heading. Typically led by ex-military men, contractor firms are by their very nature secretive. Even the U.S. government-the entity that actually pays them-knows relatively little. In The Modern Mercenary, Sean McFate lays bare this opaque world, explaining the economic structure of the industry and showing in detail how firms operate on the ground. A former U.S. Army paratrooper and private military contractor, McFate provides an unparalleled perspective into the nuts and bolts of the industry, as well as a sobering prognosis for the future of war. While at present, the U.S. government and U.S. firms dominate the market, private military companies are emerging from other countries, and warlords and militias have restyled themselves as private security companies in places like Afghanistan and Somalia. To understand how the proliferation of private forces may influence international relations, McFate looks back to the European Middle Ages, when mercenaries were common and contract warfare the norm. He concludes that international relations in the twenty-first century may have more in common with the twelfth century than the twentieth. This "back to the future" situation, which he calls "neomedievalism," is not necessarily a negative condition, but it will produce a global system that contains rather than solves problems. The Modern Mercenary is the first work that combines a broad-ranging theory of the phenomenon with an insider's understanding of what the world of the private military industry is actually like.