Catalog Search Results
Author
Pub. Date
2021.
Language
English
Description
"From two former military officers and award-winning authors, a chillingly authentic, geopolitical thriller that imagines a naval clash between the US and China in the South China Sea in 2034 -- and the path from there to a nightmarish global conflagration. On March 12, 2034, US Navy Commodore Sarah Hunt is on the bridge of her flagship, the guided missile destroyer USS John Paul Jones conducting a routine freedom of navigation patrol in the South...
Author
Pub. Date
[2023]
Language
English
Description
"This book describes the intelligence techniques and models used in cyber threat intelligence. It provides a survey of ideas, views and concepts, rather than offering a hands-on practical guide. It is intended for anyone who wishes to learn more about the domain, possibly because they wish to develop a career in intelligence, and as a reference for those already working in the area. The origins of this book lie in an awkward dinner conversation. On...
Author
Series
Intellectual technologies set volume 1
Pub. Date
2016.
Language
English
Description
Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory The purpose of the book is to critically analyze the contributions and challenges that the spread of information technologies can bring to categories...
5) The art of cyberwarfare: an investigator's guide to espionage, ransomware, and organized cybercrime
Author
Pub. Date
2022.
Language
English
Description
"This book is a guide to understanding the players in today's cyber wars, the techniques they use, and the process of analyzing their attacks. It provides an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations and informs how defenders can track and attribute future attacks"--
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request