Poetry Madness
 
 

Recently Viewed clear list


Interviews | April 8, 2014

Shawn Donley: IMG Gabrielle Zevin: The Powells.com Interview



Gabrielle ZevinThe American Booksellers Association collects nominations from bookstores all over the country for favorite forthcoming titles. The Storied Life of... Continue »
  1. $17.47 Sale Hardcover add to wish list

    The Storied Life of A. J. Fikry

    Gabrielle Zevin 9781616203214

spacer
Qualifying orders ship free.
$39.99
New Trade Paper
Ships in 1 to 3 days
Add to Wishlist
available for shipping or prepaid pickup only
Available for In-store Pickup
in 7 to 12 days
Qty Store Section
25 Remote Warehouse Networking- Computer Security

Inside Cyber Warfare: Mapping the Cyber Underworld

by

Inside Cyber Warfare: Mapping the Cyber Underworld Cover

 

Synopses & Reviews

Publisher Comments:

Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world use the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

The second edition goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside recent cyber-conflicts, including the use of Stuxnet. It also includes a foreword by Michael Chertoff (former Secretary of Homeland Security) and several guest essays, including one by Melissa Hathaway, former senior advisor to the Director of National Intelligence and Cyber Coordination Executive.

Get an in-depth look at hot topics including:

  • The role of social networks in fomenting revolution in the Middle East and Northern Africa
  • The Kremlin's strategy to invest heavily in social networks (including Facebook) and how it benefits the Russian government
  • How the U.S. Cyber Command and equivalent commands are being stood up in other countries
  • The rise of Anonymous with analysis of its anti-structure and operational style or tempo
  • Stuxnet and its predecessors, and what they reveal about the inherent weaknesses in critical infrastructure
  • The Intellectual Property (IP) war, and how it has become the primary focus of state-sponsored cyber operations

Book News Annotation:

Carr, a cyber-intelligence consultant, offers an intriguing look at hacking, cyber-security and cyber-warfare and provides an overview for policy makers and others on the current capabilities of state sponsored and private attackers and government and corporate security measures. The volume covers topics such as threat assessment, the effects of non-state hacking, the legal status of cyber-warfare, cyber-attacks as acts of war, international funding of cyber-warfare, weaponizing malware, practical advice for policy makers, and information warfare frameworks. The book also includes a country-by-country assessment of cyber-warfare capabilities. Numerous illustrations and screenshots are provided throughout. Annotation ©2012 Book News, Inc., Portland, OR (booknews.com)

Synopsis:

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries.

This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. Youll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

  • Discover how Russian investment in social networks benefits the Kremlin
  • Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa
  • Explore the rise of anarchist groups such as Anonymous and LulzSec
  • Look inside cyber warfare capabilities of nations including China and Israel
  • Understand how the U.S. can legally engage in covert cyber operations
  • Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations

Jeffrey Carr, the founder and CEO of Taia Global, Inc., is a cyber intelligence expert and consultant who specializes in the investigation of cyber attacks against governments and infrastructures by state and non-state hackers.

About the Author

Jeffrey Carr (Principal, GreyLogic) is a cyber intelligence expert, columnist for Symantec's Security Focus, and author who specializes in the investigation of cyber attacks against governments and infrastructures by State and Non-State hackers.

Mr. Carr is the Principal Investigator for Project Grey Goose, an Open Source intelligence investigation into the Russian cyber attacks on Georgia in August, 2008. The Grey Goose Phase I and Phase II reports have been widely read and well-received throughout the Intelligence, Defense, and Law Enforcement agencies of Western governments.

His work has been quoted in The New York Times, The Washington Post, The Guardian, BusinessWeek, Parameters, and Wired.

Table of Contents

Foreword; Preface; How This Book Came to Be; Conventions Used in This Book; Attributions and Permissions; How to Contact Us; Safari® Books Online; Acknowledgments; Chapter 1: Assessing the Problem; 1.1 The Complex Domain of Cyberspace; 1.2 Cyber Crime; 1.3 Future Threats; 1.4 The Conficker Worm: The Cyber Equivalent of an Extinction Event?; 1.5 Africa: The Future Home of the Worlds Largest Botnet?; 1.6 The Way Forward; Chapter 2: The Rise of the Nonstate Hacker; 2.1 The StopGeorgia.ru Project Forum; 2.2 The Russian Information War; 2.3 The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead; 2.4 Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria; 2.5 Are Nonstate Hackers a Protected Asset?; Chapter 3: The Legal Status of Cyber Warfare; 3.1 Nuclear Nonproliferation Treaties; 3.2 The Antarctic Treaty System and Space Law; 3.3 UNCLOS; 3.4 MLAT; 3.5 The Law of Armed Conflict; 3.6 Is This an Act of Cyber Warfare?; 3.7 Cyber: The Chaotic Domain; Chapter 4: Responding to International Cyber Attacks as Acts of War; 4.1 The Legal Dilemma; 4.2 The Law of War; 4.3 Nonstate Actors and the Law of War; 4.4 Analyzing Cyber Attacks under Jus ad Bellum; 4.5 The Choice to Use Active Defenses; 4.6 Conclusion; Chapter 5: The Intelligence Component to Cyber Warfare; 5.1 The Korean DDoS Attacks (July 2009); 5.2 One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack; 5.3 Ingushetia Conflict, August 2009; 5.4 The Predictive Role of Intelligence; Chapter 6: Nonstate Hackers and the Social Web; 6.1 Russia; 6.2 China; 6.3 The Middle East; 6.4 Pakistani Hackers and Facebook; 6.5 The Dark Side of Social Networks; 6.6 TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences; 6.7 Automating the Process; Chapter 7: Follow the Money; 7.1 False Identities; 7.2 Components of a Bulletproof Network; 7.3 The Bulletproof Network of StopGeorgia.ru; 7.4 SORM-2; 7.5 The Kremlin and the Russian Internet; 7.6 A Three-Tier Model of Command and Control; Chapter 8: Organized Crime in Cyberspace; 8.1 A Subtle Threat; 8.2 Russian Organized Crime and the Kremlin; Chapter 9: Investigating Attribution; 9.1 Using Open Source Internet Data; 9.2 Team Cymru and Its Darknet Report; 9.3 Using WHOIS; Chapter 10: Weaponizing Malware; 10.1 A New Threat Landscape; Chapter 11: The Role of Cyber in Military Doctrine; 11.1 The Russian Federation; 11.2 China Military Doctrine; Chapter 12: A Cyber Early Warning Model; 12.1 The Challenge We Face; Chapter 13: Advice for Policymakers from the Field; 13.1 When It Comes to Cyber Warfare: Shoot the Hostage; 13.2 The United States Should Use Active Defenses to Defend Its Critical Information Systems; 13.3 Scenarios and Options to Responding to Cyber Attacks; 13.4 In Summary; 13.5 Whole-of-Nation Cyber Security; Chapter 14: Conducting Operations in the Cyber-Space-Time Continuum; 14.1 Anarchist Clusters: Anonymous, LulzSec, and the Anti-Sec Movement; 14.2 Social Networks: The Geopolitical Strategy of Russian Investment in Social Media; 14.3 Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec; Chapter 15: The Russian Federation: Information Warfare Framework; 15.1 Russia: The Information Security State; 15.2 Russian Ministry of Defense; 15.3 Internal Security Services: Federal Security Service (FSB), Ministry of Interior (MVD), and Federal Security Organization (FSO); 15.4 Russian Federation Ministry of Communications and Mass Communications (Minsvyaz); 15.5 Further Research Areas; Chapter 16: Cyber Warfare Capabilities by Nation-State; 16.1 Australia; 16.2 Brazil; 16.3 Canada; 16.4 Czech Republic; 16.5 Democratic Peoples Republic of Korea; 16.6 Estonia; 16.7 European Union; 16.8 France; 16.9 Germany; 16.10 India; 16.11 Iran; 16.12 Israel; 16.13 Italy; 16.14 Kenya; 16.15 Myanmar; 16.16 NATO; 16.17 Netherlands; 16.18 Nigeria; 16.19 Pakistan; 16.20 Peoples Republic of China; 16.21 Poland; 16.22 Republic of Korea; 16.23 Russian Federation; 16.24 Singapore; 16.25 South Africa; 16.26 Sweden; 16.27 Taiwan (Republic of China); 16.28 Turkey; 16.29 United Kingdom; Chapter 17: US Department of Defense Cyber Command and Organizational Structure; 17.1 Summary; 17.2 Organization; Chapter 18: Active Defense for Cyber: A Legal Framework for Covert Countermeasures; 18.1 Covert Action; 18.2 Cyber Active Defense Under International Law; 18.3 Cyber Active Defenses as Covert Action Under International Law; 18.4 Cyber Attacks Under International Law: Nonstate Actors; Colophon;

Product Details

ISBN:
9781449310042
Subtitle:
Mapping the Cyber Underworld
Author:
Carr, Jeffrey
Publisher:
O'Reilly Media
Subject:
Networking-Computer Security
Subject:
Security
Subject:
FBI;NSA;attack;criminal;cyber crime;cyberwar;georgia;intelligence;internet;justice;nationalism;russia;security;terrorism;vulnerability;warfare
Edition Description:
Trade paper
Publication Date:
20111228
Binding:
Paperback
Language:
English
Pages:
318
Dimensions:
9.19 x 7 in

Related Subjects

Arts and Entertainment » Music » General
Children's » Action and Adventure » Adventure Stories
Computers and Internet » Internet » General
Computers and Internet » Internet » Hackers
Computers and Internet » Networking » Computer Security
History and Social Science » Crime » Forensics and Evidence
History and Social Science » Law » General
History and Social Science » World History » General
Reference » Science Reference » Technology

Inside Cyber Warfare: Mapping the Cyber Underworld New Trade Paper
0 stars - 0 reviews
$39.99 In Stock
Product details 318 pages O'Reilly Media - English 9781449310042 Reviews:
"Synopsis" by ,

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern cyber warfare—without truly realizing the scope of this global conflict. Inside Cyber Warfare provides fascinating and disturbing details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries.

This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. Youll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

  • Discover how Russian investment in social networks benefits the Kremlin
  • Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa
  • Explore the rise of anarchist groups such as Anonymous and LulzSec
  • Look inside cyber warfare capabilities of nations including China and Israel
  • Understand how the U.S. can legally engage in covert cyber operations
  • Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations

Jeffrey Carr, the founder and CEO of Taia Global, Inc., is a cyber intelligence expert and consultant who specializes in the investigation of cyber attacks against governments and infrastructures by state and non-state hackers.

spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.