Academic book request
In order to decide if a book might be suitable for your course we know that you need to look at it in detail.
If you are an academic teaching a course of 12 or more students you can choose up to three complimentary inspection copies of textbooks that are applicable to the courses that you teach.
To request your inspection copies, please complete the form below.
CyberwarfareAuthors: Mike Chapple, David Seidl
Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefield of cyberspace! It reviews the role that cyberwarfare plays in modern military operations — operations in which it has become almost impossible to separate cyberwarfare from traditional warfare. Part 1 discusses the history of cyberwarfare and the variety of new concerns its emergence has fostered–from tactical considerations to the law of armed conflict and protection of civilians. Part 2 discusses how offensive cyberwarfare has become an important part of the modern military arsenal. The rise of the advanced persistent threat has changed the face of cyberwarfare, and military planners must now be conscious of a series of cyberwarfare actions. In response, the defensive strategies that militaries use have evolved to protect themselves against cyber attacks. The concept of defence-in-depth is critical to building a well-rounded defence that will stand up to cyberwarfare events. Part 3 explores the future of cyberwarfare; its interaction with military doctrine; and the Pandora’s box opened by recent events, which have set the stage for future cyber attacks.
TABLE OF CONTENTS
Part I: The Cyberwarfare Landscape
Chapter 1: Information as a Military Asset
Chapter 2: Targets and Combatants
Chapter 3: Cyberwarfare, Law, and Ethics
Chapter 4: Intelligence Operations in a Connected World
Part II: Offensive and Defensive Cyberwarfare
Chapter 5: The Evolving Threat: From Script Kiddies to Advanced Attackers
Chapter 6: Social Engineering and Cyberwarfare
Chapter 7: Weaponizing Cyberspace: A History
Chapter 8: Nonstate Actors in Cyberwar
Chapter 9: Defense-in-Depth Strategies
Chapter 10: Cryptography and Cyberwar
Chapter 11: Defending Endpoints
Chapter 12: Defending Networks
Chapter 13: Defending Data
Part III: The Future of Cyberwarfare
Chapter 14: Cyberwarfare and Military Doctrine
Chapter 15: Pandora’s Box: The Future of Cyberwarfare