Stock Image

The Spectrum of Cyber Conflict from Hacking to Information Warfare: What is Law (Computer Hacking and Security)

Air Command and General Staff College

0 ratings by Goodreads
ISBN 10: 1500207918 / ISBN 13: 9781500207915
Published by CreateSpace Independent Publishing Platform, 2014
Condition: Good Soft cover
From Books Express (Portsmouth, NH, U.S.A.)

AbeBooks Seller Since August 14, 2015 Seller Rating 5-star rating

Quantity Available: 1

Buy Used
Price: US$ 106.49 Convert Currency
Shipping: Free Within U.S.A. Destination, rates & speeds
Add to basket

30 Day Return Policy

About this Item

Ships with Tracking Number! INTERNATIONAL WORLDWIDE Shipping available. May not contain Access Codes or Supplements. May be ex-library. Shipping & Handling by region. Buy with confidence, excellent customer service!. Bookseller Inventory # 1500207918

Ask Seller a Question

Bibliographic Details

Title: The Spectrum of Cyber Conflict from Hacking ...

Publisher: CreateSpace Independent Publishing Platform

Publication Date: 2014

Binding: Paperback

Book Condition:Good

About this title


Our reliance on computers and information-based technologies within DOD has greatly increased our potential for vulnerability if our information systems are attacked. DOD systems now receive numerous intrusion attempts daily and this trend appears to be increasing. It is paramount that DOD develops appropriate defensive courses of action to systematically and appropriately counter the threat of future cyber attacks. The main problem is distinguishing the type of intrusion or attack and developing the mechanisms to appropriately respond whether by law enforcement or military action. This book develops a spectrum of cyber conflict from hacking to information warfare which addresses who the adversary is, their intentions and how best to counter them. This spectrum of cyber conflict will consist of various forms of cyber attack such as hacking, hacktivism (a form of computer based civil disobedience), espionage, terrorism, and information warfare. The important issue in countering any form of cyber attack is to quickly discern the type of attack and adversary and respond appropriately. Currently, tracking down computer intrusions is a law enforcement function. The collection of information/evidence after the fact to trace the attacks back to the origin requires a robust and competent law enforcement community. The traditional war fighting military is prohibited from executing this mission domestically. If the US is a law enforcement theatre, now domestic law enforcement has a critical role in national security and national defense. This book will develop a spectrum of cyber-conflict and answer the question of when law enforcement or the military should respond to cyber attacks against US and DOD critical information systems.

"About this title" may belong to another edition of this title.

Store Description

Visit Seller's Storefront

Terms of Sale:

Buy with confidence. Excellent customer service. 30 day return policy.

Books Express LLC
1465 Woodbury Ave
Portsmouth NH 03801

Shipping Terms:

Standard and expedited shipping options include shipping and handling costs. Default shipping is by USPS Media Mail and frequently USPS Priority Mail or UPS Ground is used. Books should arrive within 10-14 business days for expedited shipping, and 20-30 business days for standard shipping. Standard shipping can on occasion take up to 30 days for delivery.

List this Seller's Books

Payment Methods
accepted by seller

Visa Mastercard American Express

Check Money Order PayPal Invoice Bank Draft Bank/Wire Transfer Direct Debit (Personally Authorized Payment)