9780197657553-0197657559-Offensive Cyber Operations: Understanding Intangible Warfare

Offensive Cyber Operations: Understanding Intangible Warfare

ISBN-13: 9780197657553
ISBN-10: 0197657559
Author: Daniel Moore
Publication date: 2022
Publisher: Oxford University Press
Format: Hardcover 328 pages
FREE US shipping on ALL non-marketplace orders
Rent
35 days
from $35.88 USD
FREE shipping on RENTAL RETURNS
Marketplace
from $52.89 USD
Buy

From $23.40

Rent

From $35.88

Book details

ISBN-13: 9780197657553
ISBN-10: 0197657559
Author: Daniel Moore
Publication date: 2022
Publisher: Oxford University Press
Format: Hardcover 328 pages

Summary

Offensive Cyber Operations: Understanding Intangible Warfare (ISBN-13: 9780197657553 and ISBN-10: 0197657559), written by authors Daniel Moore, was published by Oxford University Press in 2022. With an overall rating of 3.7 stars, it's a notable title among other AI & Machine Learning (Engineering, Computer Science) books. You can easily purchase or rent Offensive Cyber Operations: Understanding Intangible Warfare (Hardcover) from BooksRun, along with many other new and used AI & Machine Learning books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $4.58.

Description

Review
"Moore possesses an acute historical sensitivity and a scholar-practitioner's keen eye. This book cuts through the noise to explain military cyber operations with clarity and insight. An essential read for everyone interested in the complex battlespaces of twenty-first-century warfare."--Tim Stevens, Senior Lecturer in Global Security, Department of War Studies, and head of King's Cyber Security Research Group, King's College London
"No national cyber program is the same--Moore's work illustrates the complexities of offensive cyber operations through the lenses of the most capable nations who employ them, their strategic goals, and methods for doing so. A very useful framework!"-- Lauren Zabierek, Executive Director of the Cyber Project, Belfer Center, Harvard Kennedy School
"Through embedding the subject in historical lineage of signals intelligence and electronic warfare, Moore distils the true novelties as well as the continuities of the use of offensive cyber capabilities in warfare. Moore not only analyzes the use of offensive cyber operations by military powers today, but also offers us a glimpse of what is to come.', Florian J. Egloff, author of Semi-State Actors in Cybersecurity
"This deeply researched book, written by one of the most authoritative, experienced and creative voices in the wider infosec community, is an inspiration and a revelation. Its core conceptual contribution is the long-overdue distinction between presence-based and event-based offensive operations. Moore's analysis and findings will shape the debate on cyberwar for years to come."--Thomas Rid, Professor of Strategic Studies, John Hopkins University, and author of Cyber War Will Not Take Place
Cyber-warfare is often discussed, but rarely truly seen. When does an intrusion turn into an attack, and what does that entail? How do nations fold offensive cyber operations into their strategies? Operations against networks mostly occur to collect intelligence, in peacetime. Understanding the lifecycle and complexity of targeting adversary networks is key to doing so effectively in conflict.
Rather than discussing the spectre of cyber war, Daniel Moore seeks to observe the spectrum of cyber operations. By piecing together operational case studies, military strategy and technical analysis, he shows that modern cyber operations are neither altogether unique, nor entirely novel. Offensive cyber operations are the latest incarnation of intangible warfare--conflict waged through non-physical means, such as the information space or the electromagnetic spectrum.
Not all offensive operations are created equal. Some are slow-paced, clandestine infiltrations requiring discipline and patience for a big payoff; others are short-lived attacks meant to create temporary tactical disruptions. This book first seeks to understand the possibilities, before turning to look at some of the most prolific actors: the United States, Russia, China and Iran. Each has their own unique take, advantages and challenges when attacking networks for effect.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book