Coverart for item
The Resource Surviving cyberwar, Richard Stiennon

Surviving cyberwar, Richard Stiennon

Label
Surviving cyberwar
Title
Surviving cyberwar
Statement of responsibility
Richard Stiennon
Creator
Subject
Language
eng
Summary
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. The author argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack. Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In this book the author introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. He also examines the cyber threats and where they come from, explains how defensive technologies can be used to counter cyber attacks and to secure American infrastructure, considers the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. The book begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs. It follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world. It moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries. It provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill, and finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats
Cataloging source
DLC
http://library.link/vocab/creatorDate
1959-
http://library.link/vocab/creatorName
Stiennon, Richard
Dewey number
355.3/43
Index
index present
LC call number
U163
LC item number
.S73 2010
Literary form
non fiction
Nature of contents
bibliography
http://library.link/vocab/subjectName
  • Information warfare
  • Cyberterrorism
  • Cyberspace
  • Computer networks
  • Civil defense
Label
Surviving cyberwar, Richard Stiennon
Instantiates
Publication
Bibliography note
Includes bibliographical references (p. 157-164) and index
Contents
Titan rain and Shawn Carpenter -- The red wars -- Countering cyber espionage -- Toppling e-mail servers -- The Pentagon -- Geopolitical cyber hot spots -- DDoS defense -- Crowd sourcing cyber attacks -- Oh Estonia -- Cyberwar cuts a swath through Eastern Europe -- Georgia: the first cyberwar -- Conflict causes change -- Four pillars of cyberwar -- Cyber preparedness -- Repercussions
Control code
ocn612344596
Dimensions
23 cm.
Extent
ix, 170 p.
Isbn
9781605906744
Isbn Type
(cloth : alk. paper)
Lccn
2010008783
System control number
(OCoLC)612344596
Label
Surviving cyberwar, Richard Stiennon
Publication
Bibliography note
Includes bibliographical references (p. 157-164) and index
Contents
Titan rain and Shawn Carpenter -- The red wars -- Countering cyber espionage -- Toppling e-mail servers -- The Pentagon -- Geopolitical cyber hot spots -- DDoS defense -- Crowd sourcing cyber attacks -- Oh Estonia -- Cyberwar cuts a swath through Eastern Europe -- Georgia: the first cyberwar -- Conflict causes change -- Four pillars of cyberwar -- Cyber preparedness -- Repercussions
Control code
ocn612344596
Dimensions
23 cm.
Extent
ix, 170 p.
Isbn
9781605906744
Isbn Type
(cloth : alk. paper)
Lccn
2010008783
System control number
(OCoLC)612344596

Library Locations

    • Bemis Public LibraryBorrow it
      6014 South Datura Street, Littleton, CO, 80120, US
      39.6078903 -105.0037841
Processing Feedback ...