Books tagged: cyber attack

The adult filter is active; content marked as adults-only by the author is not listed. To view this content, click the button below to disable the adult filter.

Found 21 results

Through the Fires: An American Story of Turbulence, Business Triumph and Giving Back
Price: $9.99 USD. Words: 48,280. Language: English. Published: May 27, 2016. Categories: Nonfiction » Business & Economics » Business biography, Nonfiction » Biography » Autobiographies & Memoirs
This is a triumphant story of comeback in life and business. Robert Carr experienced decades of struggle that took him to the brink of home foreclosure at age fifty. He would later make a fortune in the card payments industry, only to lose almost everything in 2009, after one of the most devastating data breaches ever.
Flying and Fighting in Cyberspace - Implications for Command and Control, Network Operations, and ISR, Threat Agent Profiles, Mapping of Enemy Systems and Data, Cyber Attack and Defense, Funding
Price: $5.99 USD. Words: 126,850. Language: English. Published: April 9, 2016. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
This research paper develops the foundation for a new military operating concept to "fight the net" in support of 8th Air Force requirements and stand-up as the new Cyber Command. It applies the Air Force Concept Development framework to examine cyberspace as a newly designated warfare domain.
Air Force Cyberspace Reports: Principles of War, Act and Actor Attribution, Legal Framework, Influence Operations and the Internet, Command and Control Model, Sea Power and Fleet Resources
Price: $8.99 USD. Words: 161,510. Language: English. Published: April 7, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Internet / security
Professionally converted for accurate flowing-text e-book format reproduction, this unique book reproduces five important military reports and studies dealing with cyberspace attacks and computer network security.
Flexible Options for Cyber Deterrence - Terrorism, Problem of Attribution, Cyber Attack, Espionage, Defense, Nation State Peer Competitors, China Conflict, SCADA, Network Equipment
Price: $5.99 USD. Words: 112,340. Language: English. Published: April 4, 2016. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This paper describes options for cyber deterrence to address both asymmetric threats from terrorists and the intimidation associated with nation-state peer competitors in the cyber domain.
Cyber War: The Next Frontier for NATO - Distributed Denial of Service (DDOS) Website Internet Attacks, Hacktivists, Hackers, Cyber Attacks, Cyber Terrorism, Tallinn Manual, Possible Responses
Price: $5.99 USD. Words: 118,440. Language: English. Published: March 27, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
Professionally converted for accurate flowing-text e-book format reproduction, this unique study analyzes and explores the unique position that NATO operates in and the duty of NATO to protect its alliance members, and member states to protect each other.
Blending Science and Art: Cold War Lessons for Strategy Development in Postmodern War - Chaoplexic Warfare, Paradigms, Perceptions and Interpretation of Information (PPI), Rational Actor Model (RAM)
Price: $8.99 USD. Words: 131,020. Language: English. Published: March 8, 2016. Categories: Nonfiction » History » Military
Professionally converted for accurate flowing-text e-book format reproduction, this study explores new horizons in the theory of strategy. In studying existing theory, it doesn't take long to discover the fact that few theories offer any universal prescriptive utility, and the few that do are at best only slightly useful.
Nothing New Under the Sun: Benefiting from the Great Lessons of History to Develop a Coherent Cyberspace Deterrence Strategy - Cyber War, WMD, Nuclear and Space Deterrence, Iraq, Cuban Missile Crisis
Price: $6.99 USD. Words: 121,100. Language: English. Published: March 6, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Politics and Current Affairs » Terrorism
Professionally converted for accurate flowing-text e-book format reproduction, this study examines how the U.S. government can follow a path to an effective cyberspace deterrence strategy by examining key periods in its past, countering the contemporary hypothesis that the unique nature of cyberspace alters warfare in such a way that historical approaches to deterrence no longer apply.
Malware
Price: $0.99 USD. Words: 8,680. Language: English. Published: October 1, 2015. Categories: Fiction » Science fiction » Short stories, Fiction » Science fiction » Cyberpunk
Jay Marston works for XOr AntiVirus, fighting malware outbreaks. A new virus starts to infect computers the world over. They defeat it, but it bugs Jay. It was too easy. Something else is going on, something much bigger.
Globalization and Asymmetrical Warfare - Information and Technology, Media Effects, Merging of Defense and Commercial Technologies, Nuclear and Cyber Attack Threats to America, Force Structure
Price: $4.99 USD. Words: 57,230. Language: English. Published: November 21, 2014. Categories: Nonfiction » History » Military
This research paper analyzes the globalization trend and the effect it is having on the ability to conduct asymmetrical attacks against the United States and our Allies worldwide. This research is intended to provide insight into the way that globalization is allowing our potential adversaries to act on a global scale.
Cy's Bear Snacks and the Cyber Attack
Price: Free! Words: 2,960. Language: English. Published: May 19, 2014. Categories: Fiction » Children’s books » Readers / Chapter Books, Fiction » Children’s books » Computers
There's a crisis in Pea City! The King has run out of snacks for his pet bear, Fluffy. In this easy reader chapter book, you'll experience a fun tale that integrates important lessons on cyber attacks. Parents and teachers will find this story a joy for children to simply read for pleasure or to use as a tool to teach about computing safety and information protection.