Book picks similar to
Cyber Operations and the Use of Force in International Law by Marco Roscini


cybersec
cybersecurity-cyber-law
international-law
international-relations

Cyber War Will Not Take Place


Thomas Rid - 2013
    In 2005, the U.S. Air Force boasted it would now fly, fight, and win in cyberspace, the "fifth domain" of warfare. This book takes stock, twenty years on: is cyber war really coming? Has war indeed entered the fifth domain? Cyber War Will Not Take Place cuts through the hype and takes a fresh look at cyber security. Thomas Rid argues that the focus on war and winning distracts from the real challenge of cyberspace: non-violent confrontation that may rival or even replace violence in surprising ways. The threat consists of three different vectors: espionage, sabotage, and subversion. The author traces the most significant hacks and attacks, exploring the full spectrum of case studies from the shadowy world of computer espionage and weaponised code. With a mix of technical detail and rigorous political analysis, the book explores some key questions: What are cyber weapons? How have they changed the meaning of violence? How likely and how dangerous is crowd-sourced subversive activity? Why has there never been a lethal cyber attack against a country's critical infrastructure? How serious is the threat of "pure" cyber espionage, of exfiltrating data without infiltrating humans first? And who is most vulnerable: which countries, industries, individuals?

International Law: A Very Short Introduction (Very Short Introductions)


Vaughan Lowe - 2015
    Vaughan Lowe examines what international law can and cannot do and what it is and what it isn't doing to make the world a better place. Focussing on the problems the world faces, Lowe uses terrorism, environmental change, poverty, and international violence to demonstrate the theories and practice of international law, and how the principles can be used forinternational co-operation.

Secrets and Lies: Digital Security in a Networked World


Bruce Schneier - 2000
    Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.This edition updated with new information about post-9/11 security.

Defensive Security Handbook: Best Practices for Securing Infrastructure


Lee Brotherston - 2017
    For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring

The Educator's Guide to Texas School Law


Jim Walsh - 1985
    In this new seventh edition, the authors have streamlined the discussion by pruning older material and weaving in new developments. The result is an authoritative source on all major dimensions of Texas school law that is both well integrated and easy to read.Intended for Texas school personnel, school board members, interested attorneys, and taxpayers, the seventh edition explains what the law is and what the implications are for effective school operations. It is designed to help professional educators avoid expensive and time-consuming lawsuits by taking effective preventive action. It is an especially valuable resource for school law courses and staff development sessions.The seventh edition begins with a review of the legal structure of the Texas school system. Successive chapters address attendance and the instructional program, the education of children with special needs, employment and personnel, expression and associational rights, the role of religion in public schools, student discipline, open meetings and records, privacy, search and seizure, and legal liability under both federal and Texas law. In addition to state law, the book addresses the growing role of the federal government in school operation through such major federal legislation as the Americans with Disabilities Act, the Individuals with Disabilities Education Act, and the No Child Left Behind Act.

Introducing the LSAT: The Fox Test Prep Quick & Dirty LSAT Primer


Nathan Fox - 2012
    This might not be the only LSAT book you read, but it should definitely be the first. In his down-to-earth, often irreverent style, Nathan demystifies the confusing world of logic games, logical reasoning, and reading comprehension. In no time, you'll start to see through the BS and dominate the test. The approaches are easy to digest, and will stick with you when you finally sit down for the big day. No nonsense. No made-up, trademarked buzzwords. No confusing jargon. And best of all, no pulled punches. Plus, you’ll also find out how you can contact Nathan directly with your questions. So grab a pencil and crack this book. Let's get it on.

CRACK99: The Takedown of a $100 Million Chinese Software Pirate


David Locke Hall - 2015
    Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want to purchase satellite tracking software? No problem. Aerospace and aviation simulations? No problem. Communications systems designs? No problem. Software for Marine One, the presidential helicopter? No problem. With delivery times and customer service to rival the world’s most successful e-tailers, anybody, anywhere—including rogue regimes, terrorists, and countries forbidden from doing business with the United States—had access to these goods for any purpose whatsoever.But who was behind CRACK99, and where were they? The Justice Department discouraged potentially costly, risky cases like this, preferring the low-hanging fruit that scored points from politicians and the public. But Hall and his colleagues were determined to find the culprit. They bought CRACK99's products for delivery in the United States, buying more and more to appeal to the budding entrepreneur in the man they identified as Xiang Li. After winning his confidence, they lured him to Saipan—a U.S. commonwealth territory where Hall’s own father had stormed the beaches with the marines during World War II. There they set up an audacious sting that culminated in Xiang Li's capture and imprisonment. The value of the goods offered by CRACK99? A cool $100 million.An eye-opening look at cybercrime and its chilling consequences for national security, CRACK99 reads like a caper that resonates with every amazing detail.

The Practice of Network Security Monitoring: Understanding Incident Detection and Response


Richard Bejtlich - 2013
    The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

How to Measure Anything in Cybersecurity Risk


Douglas W. Hubbard - 2016
    In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely.Discover the shortcomings of cybersecurity's best practices Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing--as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.

The Art of War and other Laws of Power


Sun Tzu
    In this newest translation of The Art of War readers will benefit from the interpretations from other translators and strategist, as well as the 50 strategic rules, including: -- How to look for strategic turns to meet the competition-- How to attain strategic superiority and crush the competition-- How to plan surprise and stay ahead of the game-- And more timeless wisdom that will allow you to compete and win in the dynamic business environment!Business managers around the world have tapped into this ancient wisdom; it is time to master The Art of War for Manager for the existence and growth of your business!

Cyberwar: The Next Threat to National Security & What to Do About It


Richard A. Clarke - 2010
    Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.

Red Zone: China's Challenge and Australia's Future


Peter Hartcher - 2021
    

Five to Rule Them All: The UN Security Council and the Making of the Modern World


David L. Bosco - 2009
    Drawing on extensive research, including dozens of interviews with serving and former ambassadors on the Council, the book chronicles political battles and personality clashes as it opens the closed doors of its meeting room. What emerges here is a revealing portrait of the most powerful diplomatic body in the world. When the five permanent members are united, David Bosco points out, the Council can wage war, impose blockades, redraw borders, unseat governments, and levy sanctions. There are almost no limits to its authority. Yet the Council exists in a world of realpolitik. Its members are, above all, powerful states with their own diverging interests. Time and again, the Council's performance has dashed the hope that its members would somehow work together to establish a more peaceful world. But if these lofty hopes have been unfulfilled, the Council has still served an invaluable purpose: to prevent conflict between the Great Powers. In this role, the Council has been an unheralded success. As Bosco reminds us, massacres in the Balkans and chaos in Iraq are human tragedies, but conflicts between the world's great powers in the nuclear age would be catastrophic.In this lively, fast-moving, and often humorous narrative, Bosco illuminates the role of the Security Council in the postwar world, making a compelling case for the enduring importance of the five who rule them all.

Spycraft Rebooted: How Technology is Changing Espionage


Edward Lucas - 2018
    Once, intelligence operations could employ James Bond-style forgeries and disguises to infiltrate a target, but modern-day spies must succeed at the seemingly impossible: to hide in plain sight in a world where everything is visible.Our technology-reliant lives are a trail of electronic interactions; from card payments to CCTV, we leave involuntary and often unwitting digital footprints. Faking this online trail is hard, while the lack of one is dangerously conspicuous. When even an expertly forged ID has little chance against biometric databases and facial recognition technology, how can open societies’ intelligence agencies continue to operate undercover?In this gripping, meticulously researched study, drawing on numerous real-life cases, Edward Lucas, an acclaimed espionage expert, tracks the changing landscape of international spycraft—and highlights the West’s growing disadvantage against its autocratic adversaries.

Every War Must End


Fred Charles Iklé - 1971
    However, as recent events in Iraq have once again demonstrated, it is much easier to start a war than it is to end it.Every War Must End, which Colin Powell credits in his autobiography with having shaped his thinking on how to end the first Gulf War, analyzes the many critical obstacles to ending a war& mdash;an aspect of military strategy that is frequently and tragically overlooked. This book explores the difficult and often painful process through which wars in the modern age have been brought to a close and what this process means for the future. Ikl� considers a variety of examples from twentieth-century history and examines specific strategies that effectively "won the peace," including the Allied policy in Germany and Japan after World War II.In the new preface to his classic work, Ikl� explains how U.S. political decisions and military strategy and tactics in Iraq -- the emphasis on punishing Iraqi leaders, not seeking a formal surrender, and the failure to maintain law and order-have delayed, and indeed jeopardized, a successful end to hostilities.