Results by Title
7 books about Hacking
|
READERS PUBLISHERS STUDENT SERVICES |
Results by Title
7 books about Hacking
|
READERS PUBLISHERS STUDENT SERVICES |
BiblioVault ® 2001 - 2023
The University of Chicago Press
Advocates a cybersecurity “social contract” between government and business in seven key economic sectors
Cybersecurity vulnerabilities in the United States are extensive, affecting everything from national security and democratic elections to critical infrastructure and economy. In the past decade, the number of cyberattacks against American targets has increased exponentially, and their impact has been more costly than ever before. A successful cyber-defense can only be mounted with the cooperation of both the government and the private sector, and only when individual corporate leaders integrate cybersecurity strategy throughout their organizations.
A collaborative effort of the Board of Directors of the Internet Security Alliance, Fixing American Cybersecurity is divided into two parts. Part One analyzes why the US approach to cybersecurity has been inadequate and ineffective for decades and shows how it must be transformed to counter the heightened systemic risks that the nation faces today. Part Two explains in detail the cybersecurity strategies that should be pursued by each major sector of the American economy: health, defense, financial services, utilities and energy, retail, telecommunications, and information technology.
Fixing American Cybersecurity will benefit industry leaders, policymakers, and business students. This book is essential reading to prepare for the future of American cybersecurity.
“A must-read…It reveals important truths.”
—Vint Cerf, Internet pioneer
“One of the finest books on information security published so far in this century—easily accessible, tightly argued, superbly well-sourced, intimidatingly perceptive.”
—Thomas Rid, author of Active Measures
Cyber attacks are less destructive than we thought they would be—but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, our tech and health systems, our democracy, and impact every aspect of our lives. Packed with insider information based on interviews with key players in defense and cyber security, declassified files, and forensic analysis of company reports, The Hacker and the State explores the real geopolitical competition of the digital age and reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. It moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to election interference and billion-dollar heists.
Ben Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. Quietly, insidiously, cyber attacks have reshaped our national-security priorities and transformed spycraft and statecraft. The United States and its allies can no longer dominate the way they once did. From now on, the nation that hacks best will triumph.
“A helpful reminder…of the sheer diligence and seriousness of purpose exhibited by the Russians in their mission.”
—Jonathan Freedland, New York Review of Books
“The best examination I have read of how increasingly dramatic developments in cyberspace are defining the ‘new normal’ of geopolitics in the digital age.”
—General David Petraeus, former Director of the CIA
“Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war—what Buchanan refers to as ‘real geopolitical competition.’”
—Richard Harknett, former Scholar-in-Residence at United States Cyber Command
On May 21, 2010, Daniel J. Cohen and Tom Scheinfeldt posted the following provocative questions online:
“Can an algorithm edit a journal? Can a library exist without books? Can students build and manage their own learning management platforms? Can a conference be held without a program? Can Twitter replace a scholarly society?”
As recently as the mid-2000s, questions like these would have been unthinkable. But today serious scholars are asking whether the institutions of the academy as they have existed for decades, even centuries, aren’t becoming obsolete. Every aspect of scholarly infrastructure is being questioned, and even more importantly, being hacked. Sympathetic scholars of traditionally disparate disciplines are canceling their association memberships and building their own networks on Facebook and Twitter. Journals are being compiled automatically from self-published blog posts. Newly minted PhDs are forgoing the tenure track for alternative academic careers that blur the lines between research, teaching, and service. Graduate students are looking beyond the categories of the traditional CV and building expansive professional identities and popular followings through social media. Educational technologists are “punking” established technology vendors by rolling out their own open source infrastructure.
Here, in Hacking the Academy, Daniel J. Cohen and Tom Scheinfeldt have gathered a sampling of the answers to their initial questions from scores of engaged academics who care deeply about higher education. These are the responses from a wide array of scholars, presenting their thoughts and approaches with a vibrant intensity, as they explore and contribute to ongoing efforts to rebuild scholarly infrastructure for a new millennium.
Are nuclear arsenals safe from cyber-attack? Could terrorists launch a nuclear weapon through hacking? Are we standing at the edge of a major technological challenge to global nuclear order? These are among the many pressing security questions addressed in Andrew Futter’s ground-breaking study of the cyber threat to nuclear weapons.
Hacking the Bomb provides the first ever comprehensive assessment of this worrying and little-understood strategic development, and it explains how myriad new cyber challenges will impact the way that the world thinks about and manages the ultimate weapon. The book cuts through the hype surrounding the cyber phenomenon and provides a framework through which to understand and proactively address the implications of the emerging cyber-nuclear nexus. It does this by tracing the cyber challenge right across the nuclear weapons enterprise, explains the important differences between types of cyber threats, and unpacks how cyber capabilities will impact strategic thinking, nuclear balances, deterrence thinking, and crisis management. The book makes the case for restraint in the cyber realm when it comes to nuclear weapons given the considerable risks of commingling weapons of mass disruption with weapons of mass destruction, and argues against establishing a dangerous norm of “hacking the bomb.”
This timely book provides a starting point for an essential discussion about the challenges associated with the cyber-nuclear nexus, and will be of great interest to scholars and students of security studies as well as defense practitioners and policy makers.
Popular anger against the financial system has never been higher, yet the practical workings of the system remain opaque to many people. The Heretic's Guide to Global Finance aims to bridge the gap between protest slogans and practical proposals for reform.
Brett Scott is a campaigner and former derivatives broker who has a unique understanding of life inside and outside the financial sector. He builds up a framework for approaching it based on the three principles of 'Exploring', 'Jamming' and 'Building', offering a practical guide for those who wish to deepen their understanding of, and access to, the inner workings of financial institutions.
Scott covers aspects frequently overlooked, such as the cultural dimensions of the financial system, and considers major issues such as agricultural speculation, carbon markets and tar-sands financing. Crucially, it also showcases the growing alternative finance movement, showing how everyday people can get involved in building a new, democratic, financial system.
BiblioVault ® 2001 - 2023
The University of Chicago Press