Cyberwarfare: Information Operations in a Connected World

Cyberwarfare: Information Operations in a Connected World
ISBN-10
1284225445
ISBN-13
9781284225440
Series
Cyberwarfare
Category
Computers
Pages
1000
Language
English
Published
2021-10
Publisher
Jones & Bartlett Learning
Authors
Mike Chapple, David Seidl

Description

Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefield of cyberspace! It reviews the role that cyberwarfare plays in modern military operations–operations in which it has become almost impossible to separate cyberwarfare from traditional warfare.

Other editions

Similar books

  • Introduction to Cyber-Warfare: A Multidisciplinary Approach
    By Jana Shakarian, Paulo Shakarian, Andrew Ruef

    Nate Lawson authored an analysis of Stuxnet that described it as “embarrassing, not amazing.” In this analysis, Lawson references the existence of a code protection system termed “secure triggers,” first published by researchers at the ...

  • Cyberwarfare: Terror at a Click
    By John V. Blane

    Some that have discussed the subject more openly include the United Kingdom, France, Germany, Russia and China. Many of these are developing views toward the use of cyberwarfare that differ from these of the United States.

  • Cyberwarfare: Attribution, Preemption, and National Self Defense
    By John Dever, James Dever

    This paper proposes a new consequentialist standard based on an "Effects Test" to define when cyberattacks constitute an armed attack that can be responded to in self-defense.

  • Inside Cyber Warfare: Mapping the Cyber Underworld
    By Jeffrey Carr

    Provides information on the ways individuals, nations, and groups are using the Internet as an attack platform.

  • Cybersecurity: What Everyone Needs to Know
    By Peter W. Singer, Allan Friedman

    An authoritative, single-volume introduction to cybersecurity addresses topics ranging from phishing and electrical-grid takedowns to cybercrime and online freedom, sharing illustrative anecdotes to explain how cyberspace security works and ...

  • CYBERWARFARE SOURCEBOOK
    By A. Kiyuna, L. Conyers

    This hacker ethic was publicized and perhaps originated in Steven Levy's Hackers: Heroes of the Computer Revolution (1984). It contains a codification of its principles. The programmer subculture of hackers disassociates from the mass ...

  • Encyclopedia of Cyber Warfare
    By Paul J. Springer

    Paul J. Springer. Further Reading Libicki, Martin. Crisis and Escalation in Cyberspace. Santa Monica, CA: RAND, 2013. Obama, Barack. International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World.

  • Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
    By Jason Andress, Steve Winterfeld

    The Morris worm, one of the first worms ever created, was written in 1988 by a Cornell University student named Robert Morris. Morris created the worm as a tool to gauge the size of the Internet. He took steps to disguise its point of ...

  • Cyberwarfare: An Introduction to Information-age Conflict
    By Isaac R. Porche

    This book reviews and explains the technologies that underlie offensive and defensive cyber operations, which are practiced by a range of cyber actors including state actors, criminal enterprises, activists, and individuals.

  • Cyber Warfare: Building the Scientific Foundation
    By Paulo Shakarian, V.S. Subrahmanian, Sushil Jajodia

    6.3 Cyber kill chain for computer network intrusions At the top of the pyramid is the cyber campaign: a strategic construct used by decision makers in articulating and achieving strategic objectives. The small size of the pyramid's apex ...