Books tagged: cyber warfare

These results show books which have been specifically tagged with this keyword. You can also try doing a general search for the term "cyber warfare" .
You can also limit results to books that contain two tags.
The adult filter is active; there may be additional content. To view this content, click the "Adult Content" button
above or
below to change your filtering option.

Found 19 results

The Complete Shadowkill Trilogy
Series: Shadowkill Trilogy. Price: $7.99 USD. Words: 192,280. Language: English. Published: October 9, 2017. Categories: Fiction » Adventure » War & military adventure, Fiction » Science fiction » Adventure
From the backwoods of Minnesota to the heart of Washington DC, this is the complete Shadowkill Trilogy. SHADOWs (Strategic Hazardous Android for Defensive Operations and Warfare) are the latest in innovations in robotic military technology. Now all three books are available together in this complete box set. Book 1: Killzone Book 2: Homeland Defense Book 3: Storming The Hill
For the Common Defense of Cyberspace: Implications of a U.S. Cyber Militia on Department of Defense Cyber Operations - Is Threat Overblown, Privateers, Contractors, Legal Overview, Operating Concept
Price: $6.99 USD. Words: 37,560. Language: English. Published: April 2, 2017. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » Computers and Internet » Networking / security
This work examines the current cyber space threat against the US, the current gaps in combating it, and how a US cyber militia might fill those gaps. Militias have historically been used by the US as an emergency measure to protect national security and to defend the homeland in lieu of a regular standing force.
Impact of Alleged Russian Cyber Attacks - Weakness of Cyber Defenses Against Cyber Warfare Demonstrated by High-Profile Attacks Against Estonia and Georgia, Multilateral Initiatives, Countermeasures
Price: $6.99 USD. Words: 30,540. Language: English. Published: March 22, 2017. Categories: Nonfiction » History » Russian, Nonfiction » Computers and Internet » Security
When countries or organizations stand in opposition to Russia they are likely to receive a cyber attack in order to influence their position. The high likelihood of future cyber attacks, the ease of conducting cyber attacks, and the amount of networks to conduct the attacks make this monograph relevant for study.
An Evaluation of the Human Domain Concept: Organizing the Knowledge, Influence, and Activity in Population-Centric Warfare – Military Innovation, Development in Sea, Air, Space, and Cyber Domains
Price: $6.99 USD. Words: 35,880. Language: English. Published: March 1, 2017. Categories: Nonfiction » History » Military, Nonfiction » History » Military
As the U.S. military prepares for future conflicts, the increasing likelihood of population-centric approaches to warfare sparks the need for adaptation to better understand, influence, and act in the human environment.
Minacce cibernetiche
Price: $3.99 USD. Words: 36,210. Language: Italian. Published: February 19, 2017 by Fuoco Edizioni. Categories: Nonfiction » True Crime » Computer Crime, Essay » Technology
Dal crimine informatico ai danni di aziende e semplici cittadini, alle "cyber-guerre" combattute in modo silenzioso dagli Stati, gli hacker sono ormai i protagonisti della Rete. Come difendere la nostra privacy ed il nostro conto in banca? Il libro spiega in modo chiaro ed esaustivo le tecniche di difesa per utilizzare Internet in tutta sicurezza.
The Crescent Onion
Series: The Onion Files. Price: $3.10 USD. Words: 101,460. Language: English. Published: February 14, 2017. Categories: Fiction » Thriller & suspense » Spies & espionage
Cold War enemies call the shots on terror. The Crescent Onion is a riveting espionage thriller, written with a degree of realism only a top insider could deliver. Val weaves a complex story that could be tomorrow's headline news. Retired CIA operative Jim Buchan is drawn into the center of a maelstrom of threats to international security, with a hearty serving of violent action and human frailty.
Adapting Unconventional Warfare Doctrine to Cyberspace Operations: Examination of Hacktivist Based Insurgencies - Cyber Warfare Roles of Russia, China, Analysis of 2014 Hong Kong Umbrella Revolution
Price: $6.99 USD. Words: 34,660. Language: English. Published: January 24, 2017. Categories: Nonfiction » History » Military, Nonfiction » Computers and Internet » Security
This study proposes how cyberspace operations can best support online resistance movements to influence adversary national will or affect political behavior to achieve U.S. strategic objectives.
Cyber War: The Next Frontier for NATO - Cyber Attack Response Readiness, Invoking Article 5, Discussion of the Tallinn Manual, Distributed Denial of Service (DDoS), Resilience Management Model (RMM)
Price: $5.99 USD. Words: 32,290. Language: English. Published: December 7, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » European
Defining and understanding what constitutes a cyber-attack is a complicated matter, largely due to the fact that there has not yet been a large-scale cyber-attack upon any nation.
Cyber Warfare: Jus Post Bellum - Problem of Cyber Attack Accountability, International Treaties for Post-Conflict Period, Comparison to Traditional Warfare, 1998 Kosovo and 2003 Iraq Wars, North Korea
Price: $7.99 USD. Words: 41,180. Language: English. Published: November 29, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Military
There is a lack of attention to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability for the restoration of affected infrastructure and remediation of violation of established laws of war after cyberattacks occur.
Chinese Cyber Espionage: A Complementary Method to Aid PLA Modernization - Hacker Groups, Hactivists, PLA Modernization, Information Warfare Militias, Document 27 Blueprint, Military Platforms
Price: $7.99 USD. Words: 51,160. Language: English. Published: October 4, 2016. Categories: Nonfiction » Computers and Internet » Security, Nonfiction » History » Asian
In the last two decades, Chinese cyber espionage has cultivated a significant reputation in cyberspace for its high-volume, illicit exploitation of defense technology. At the same time, the PLA has also rapidly modernized its naval, fighter jet, and air defense technologies.