June 6th, 2025
Home | Log in!

On Top Shelf
MIXED INKMIXED INK
Fresh Pick
THE TRADWIFE'S SECRET
THE TRADWIFE'S SECRET

New Books This Week

Reader Games

🌸 Summer Kick-Off Giveaways


Sunshine, secrets, and swoon-worthy stories—June's featured reads are your perfect summer escape.

Slideshow image


Since your web browser does not support JavaScript, here is a non-JavaScript version of the image slideshow:

slideshow image
He doesn�t need a woman in his life; she knows he can�t live without her.


slideshow image
A promise rekindled. A secret revealed. A second chance at the family they never had.


slideshow image
A cowboy with a second chance. A waitress with a hidden gift. And a small town where love paints a brand-new beginning.


slideshow image
She�s racing for a prize. He�s dodging romance. Together, they might just cross the finish line to love.


slideshow image
She steals from the mob for justice. He�s the FBI agent who could take her down�or fall for her instead.


slideshow image

He�s her only protection. She�s carrying his child. Together, they must outwit a killer before time runs out.


Inside Cyber Warfare
Jeffrey Carr

Mapping The Cyber Underworld

O'Reilly Media
August 2010
On Sale: December 23, 2009
240 pages
ISBN: 0596802153
EAN: 9780596802158
Paperback
Add to Wish List

Non-Fiction

You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.

* Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine * Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations * Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival * Find out why many attacks originate from servers in the United States, and who's responsible * Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

Comments

No comments posted.

Registered users may leave comments.
Log in or register now!

© 2003-2025 off-the-edge.net  all rights reserved Privacy Policy