• Contact

  • Newsletter

  • About us

  • Delivery options

  • News

  • 0
    Cyber Warfare: A Reference Handbook

    Cyber Warfare by Springer, Paul J.;

    A Reference Handbook

    Series: Contemporary World Issues;

      • GET 10% OFF

      • The discount is only available for 'Alert of Favourite Topics' newsletter recipients.
      • Publisher's listprice GBP 55.00
      • The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.

        27 835 Ft (26 510 Ft + 5% VAT)
      • Discount 10% (cc. 2 784 Ft off)
      • Discounted price 25 052 Ft (23 859 Ft + 5% VAT)

    27 835 Ft

    db

    Availability

    Estimated delivery time: In stock at the publisher, but not at Prospero's office. Delivery time approx. 3-5 weeks.
    Not in stock at Prospero.

    Why don't you give exact delivery time?

    Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.

    Product details:

    • Edition number 2
    • Publisher Bloomsbury Academic
    • Date of Publication 25 July 2024
    • Number of Volumes Hardback

    • ISBN 9781440879708
    • Binding Hardback
    • No. of pages368 pages
    • Size 230x154x22 mm
    • Weight 571 g
    • Language English
    • 732

    Categories

    Short description:

    An informative, one-stop resource for understanding the birth and evolution of cyber warfare, notable examples of its use, and strategies for defending against such attacks.

    More

    Long description:

    Cyberwarfare, a term that encompasses a wide range of computer-based attacks on targeted enemy states, has emerged as one of the most pressing national security concerns of the 21st century. All around the world, the scramble to shield thoroughly computerized military and infrastructure resources from cyber attacks is intensifying. Military experts, for example, believe that Ukraine's ability to defend its cyberspace from Russian cyber attacks was one of the key reasons Russia's dramatic 2022 invasion of neighboring Ukraine failed to topple the Ukrainian government in Kiev.

    This all-in-one resource explains the world of cyber warfare in authoritative but lay friendly terms. First, it details the historical evolution of cyber warfare and the different forms it can take, from crippling attacks on power grids and communications networks to secret intelligence gathering. From there it moves into a wide-ranging exploration of the main controversies and issues surrounding cyber security and cyber warfare, as well as coverage of major cyber warfare attacks, the organizations responsible, and the steps that the United States and other countries are taking to protect themselves from this constantly evolving threat.

    Like all books in the Contemporary World Issues series, this volume features a suite of "Perspectives" in which cyber warfare experts provide insights on various elements of cyber warfare. Other features include informative primary documents, data tables, chronology, and a glossary of terms.

    More

    Table of Contents:

    Preface

    1. Background and History
    Information as a Tool of War
    The Role of Communications in Modern Warfare
    Early Attempts at Encryption
    Direct Observation Techniques
    The Creation of Cyberspace
    The Cyber Attacks Begin
    Cyber Enabling in the Nuclear Middle East
    Preparation for Infrastructure Cyber Attacks
    Russian Hacktivists and National Pride
    The Chinese Approach to Irregular Warfare
    Non-State Actors and Cyber War
    Ukraine and the Digital Conflict
    The Current State of Cyber War
    References

    2. Problems, Controversies, and Solutions
    Is a Cyber War Possible?
    Cyber as a Military Domain
    Cyber Strategy
    Instruments of National Power
    Cyber Crime, Cyber Espionage, and Cyberterrorism
    The Problem of Attribution
    The Dangers of Escalation
    People and Paranoia
    Cyber Ethics
    Funding Conflict Through the Cyber Domain
    References

    3. Perspectives
    The DoD Information System Network as a Weapon System Mary E. Braun
    The Challenges of Protecting Academia Kurt Peifer
    Ransomware and the Private Sector Christopher R. Boom
    Waging e-Jihad Heidi Dexter
    Cyber Warfare in the Professional Military Education System S. Michael Pavelec

    4. Profiles
    Alexander, Keith B.
    Anonymous
    CrowdStrike
    Defense Advanced Research Projects Agency
    Defense Information Systems Agency (U.S.)
    Equation Group
    Fancy Bear (Russian Hacking Group)
    FireEye, Inc.
    Google, Inc.
    Government Communications Headquarters (GCHQ, United Kingdom)
    Hayden, Michael
    Kaspersky, Yevgeniy "Eugene" Valentinovich
    Lazarus Group (DPRK Hacking Group)Lehel, Marcel Lazar ("Guccifer")
    Libicki, Martin
    Mandiant
    McAfee, Inc.
    Microsoft Corporation
    Mitnick, Kevin
    Nakasone, Paul M.
    National Security Agency (U.S.)
    NATO Cooperative Cyber Defence Centre of Excellence
    People's Liberation Army Unit 61398 (PRC)
    Qiao Liang and Wang Xiangsui
    RAND Corporation
    Rogers, Michael S.
    Russian Business Network
    Shadow Brokers, The (Hacking Group)
    Snowden, Edward
    Stuxnet
    Symantec Corporation
    Syrian Electronic Army
    Turing, Alan
    U.S. Cyber Command
    WikiLeaks
    References

    5. Documents
    Tallinn Manual on the International Law Applicable to Cyber Warfare (2010)
    Michael Rogers, "Testimony before the U.S. House Intelligence Committee" (2014)
    People's Republic of China National Cyberspace Security Strategy (2016)
    Assessing Russian Activities and Intentions in Recent U.S. Elections (2017)
    Military and Security Developments Involving the Democratic People's Republic of Korea (2017)
    Glenn S. Gerstell, "How We Need to Prepare for a Global Cyber Pandemic" (2018)
    National Cyber Strategy of the United States (2018)
    Executive Order 13800-Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure (2018)
    Department of Homeland Security Cybersecurity Strategy (2021)
    Cybersecurity & Infrastructure Security Agency, "Russian State-Sponsored and Criminal Cyber Threats to Critical Infrastructure" (2022)

    6. Resources
    Print Resources
    Nonprint Resources

    7. Chronology

    Glossary
    Index
    About the Author

    More