Introduction to Cyber-Warfare, 1st Edition

  • Published By:
  • ISBN-10: 0124079261
  • ISBN-13: 9780124079267
  • DDC: 355.4
  • Grade Level Range: College Freshman - College Senior
  • 336 Pages | eBook
  • Original Copyright 2013 | Published/Released May 2014
  • This publication's content originally published in print form: 2013

  • Price:  Sign in for price



Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.

Table of Contents

Front Cover.
Half Title Page.
Title Page.
Copyright Page.
1: Cyber Warfare: Here and Now.
2: Cyber Attack.
3: Political Cyber Attack Comes of Age in 2007.
4: How Cyber Attacks Augmented Russian Military Operations.
5: When who Tells the Best Story Wins: Cyber and Information Operations in the Middle East.
6: Limiting Free Speech on the Internet: Cyber Attack against Internal Dissidents in Iran and Russia.
7: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates.
8: Cyber Espionage and Exploitation.
9: Enter the Dragon: Why Cyber Espionage Against Militaries, Dissidents, and Nondefense Corporations is a Key Component of Chinese Cyber Strategy.
10: Duqu, Flame, Gauss, the Next Generation of Cyber Exploitation.
11: Losing Trust in Your Friends: Social Network Exploitation.
12: How Iraqi Insurgents Watched U.S. Predator Video—Information Theft on the Tactical Battlefield.
13: Cyber Operations for Infrastructure Attack.
14: Cyber Warfare against Industry.
15: Can Cyber Warfare Leave a Nation in the Dark? Cyber Attacks against Electrical Infrastructure.
16: Attacking Iranian Nuclear Facilities: Stuxnet.
Conclusion and the Future of Cyber Warfare.
Appendix I: LulzSec Hacktivities.
Appendix II: Anonymous Timeline.