This guide serves as a starting point to help you find information and resources on the subject of Cybersecurity. Explore the navigation menu to find books, databases, journals, websites, and more.
Designed to help researchers gather, manage, and store research information, as well as generate citations and bibliographies. For additional information, please see our RefWorks guide.
Experts lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. The book discusses the latest developments in military and security technology and how people and governments can protect themselves.
aims to analyze the processes of information warfare and cyber warfare through historical, operational and strategic perspectives of cyber attack. It is original in its delivery because of its multidisciplinary approach within an international framework, with studies dedicated to different states – Canada, Cuba, France, Greece, Italy, Japan, Singapore, Slovenia and South Africa – describing the state's application of information warfare principles both in terms of global development and “local” usage and examples.
Explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.
This definitive reference resource on cyber warfare covers all aspects of this headline topic, providing historical context of cyber warfare and an examination its rapid development into a potent technological weapon of the 21st century.
As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect yourselves from this threat. Among the many important topics covered in this collection are building a secure cyberspace ecosystem; a public-private partnership to secure cyberspace; operation and law enforcement to protect our cyber citizens and to safeguard our cyber infrastructure; and strategy and policy issues to secure and sustain our cyber ecosystem.
This book will introduce you to the common cyberthreat landscape and common attacks such as malware, phishing, insider threats, and DDoS and help you to understand the workings of Blockchain technology.
The book provides the complete strategic understanding requisite to allow a person to create and use the RMF process recommendations for risk management.
As the aviation and space sectors become ever more connected to cyberspace and reliant on related technology, they become more vulnerable to potential cyberattacks. As a result, cybersecurity is a growing concern that all stakeholders in both sectors must consider. In this forward-looking book, which is the first comprehensive analysis of the relevant facets of cybersecurity in the aviation and space sectors, the authors explore the vast spectrum of relevant international and European Union (EU) law, with specific attention to associated risks, existing legal provisions and the potential development of new rules.
Cyber Wars gives you the dramatic inside stories of some of the world's biggest cyber attacks. These are the game changing hacks that make organizations around the world tremble and leaders stop and consider just how safe they really are.
Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cybersecurity.
Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied.