'Cyber Warfare and Cyber Terrorism'

Discussion forum on topics of Information Warfare and Cybercrime
Post Reply
timothyrobarts
Posts: 107
Joined: February 3rd, 2011, 12:43 pm

'Cyber Warfare and Cyber Terrorism'

Post by timothyrobarts » February 4th, 2011, 6:23 pm

Cyber Warfare and Cyber Terrorism (Premier Reference) [Hardcover]

Lech J. Janczewski (Author, Editor), Andrew M. Colarik (Editor)

http://www.amazon.com/Cyber-Warfare-Ter ... B000U6I1E6

Product Description
Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources. However, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field. Cyber Warfare and Cyber Terrorism provides in-depth coverage of cyber terrorism phenomena and its societal and organizational implications worldwide. Featuring contributions from noted researchers throughout the world, with years of scholarly and research experiences related to this rapidly expanding problem, this publication is a crucial reference source enabling libraries everywhere to meet information needs on this pressing topic.

About the Author
Lech Janczewski has over thirty five years experience in information technology. He is an Associate Professor at the University of Auckland, Department of Information Science and Operations Management. His area of research includes management of IS resources with the special emphasis on data security. Dr. Janczewski has written more than 100 publications that have been presented in scientific journals, conference proceedings and books. He is the chairperson of the New Zealand Information Security Forum, a Fellow of the New Zealand Computer Society, and the secretary of the IFIP’s Technical Committee on Security and Protection in Information Processing Systems (TC-11).
Last edited by timothyrobarts on February 13th, 2011, 5:10 pm, edited 1 time in total.

timothyrobarts
Posts: 107
Joined: February 3rd, 2011, 12:43 pm

Cyber Security and Global Information Assurance: Threat Anal

Post by timothyrobarts » February 4th, 2011, 8:07 pm

Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions [quote][/quote] (Advances in Information Security and Privacy) [Hardcover]

Kenneth J. Knapp

http://www.amazon.com/Cyber-Security-Gl ... pd_sbs_b_5

Product Description
The increasing societal dependence on information technology has pushed cyber-security to the forefront as one of the most urgent challenges facing the global community.
Cyber-Security and Global Information Assurance: Threat Analysis and Response Solutions provides a valuable resource for academicians and practitioners by addressing the most pressing issues facing cyber-security from both a national and global perspective. This reference source takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.

About the Author
Kenneth J. Knapp is the Deputy Head of the Department of Management at the U.S. Air Force Academy, Colorado. He has over 20 years of experience working with information technology and security in the U. S. Air Force. He earned a Bachelor of Science in Computer Science from DeSales University in Pennsylvania, an M. B. A. from Auburn University at Montgomery and a PhD in the Management of Information Technology from Auburn University, Alabama. Dr. Knapp has published in outlets such as the International Journal of Information Security & Privacy, Information Management & Computer Security, Communications of the Association for Information Systems, Information Systems Management, Information Systems Security, and the Journal of Digital Forensics, Security and Law. His research has also appeared in numerous chapter books such as the Information Security Management Handbook, 2007 and 2008 editions, edited by Hal Tipton and Micki Krause. He has presented his research at numerous conferences to include annual RSA conferences. Dr. Knapp's research results have appeared in online media outlets such as CIO, CSO, Networkworld and Computerworld and he has won numerous research and teaching awards. He recently accepted a tenure-track position in the Information and Technology Management Department at The University of Tampa, Florida.

timothyrobarts
Posts: 107
Joined: February 3rd, 2011, 12:43 pm

Inside Cyber Warfare: Mapping the Cyber Underworld

Post by timothyrobarts » February 4th, 2011, 8:16 pm

Inside Cyber Warfare: Mapping the Cyber Underworld [Paperback]
Jeffrey Carr

http://www.amazon.com/Inside-Cyber-Warf ... pd_sim_b_2

Editorial Reviews
Product Description
What people are saying about Inside Cyber Warfare

"The necessary handbook for the 21st century."

--Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments

"A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war."

--Jim Stogdill, CTO, Mission Services Accenture

You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.

Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations
Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
Find out why many attacks originate from servers in the United States, and who's responsible
Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

About the Author
Jeffrey Carr (Principal, GreyLogic) is a cyber intelligence expert, columnist for Symantec's Security Focus, and author who specializes in the investigation of cyber attacks against governments and infrastructures by State and Non-State hackers.

Mr. Carr is the Principal Investigator for Project Grey Goose, an Open Source intelligence investigation into the Russian cyber attacks on Georgia in August, 2008. The Grey Goose Phase I and Phase II reports have been widely read and well-received throughout the Intelligence, Defense, and Law Enforcement agencies of Western governments.

His work has been quoted in The New York Times, The Washington Post, The Guardian, BusinessWeek, Parameters, and Wired.

davidjasmith
Posts: 11
Joined: February 3rd, 2011, 10:55 am

Book Lists

Post by davidjasmith » February 7th, 2011, 1:04 pm

Please post any books relevant to this topic under this thread.

Post Reply