Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.


You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.

  • Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine

  • Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations

  • Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival

  • Find out why many attacks originate from servers in the United States, and who's responsible

  • Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

Subscriber Reviews

Average Rating: 4.333333333333333 out of 5 rating Based on 3 Ratings

"Very Informative" - by Craig on 14-NOV-2010
Reviewer Rating: 1 star rating2 star rating3 star rating4 star rating5 star rating
Lots of 'big-picture' information on the threat of Cyber Warfare. Not only does the book present multiple attack and defence scenarios but it also constantly asks you to think about how the whole Cyber Security field will develop over the next few years. Highly recommended to those interested or currently working in Cyber Security. The book is mostly non-technical so is a good read for all interested parties.
Report as Inappropriate

"Net and Set" - by johnrod on 13-DEC-2009
Reviewer Rating: 1 star rating2 star rating3 star rating4 star rating5 star rating
Cyberwar is undefined, yet a form of cyber watch has positioned itself in the gap between conventional armed domains and what the author calls a parallel universe out of scifi. The book is based on politically motivated Russian conflicts monitored by Project Gray Goose and extends to China, Middle East and US. Excerpts by others cover analysis methodologies, information weapons, and attack prediction and responses. It is more about cases and policies than tools. Cyber espionage is shown by Titan rain, and cyber crime by conficker worm, Heartland Payment systems and botnets. Links between crime, intelligence and government are investigated such as RBN. The different cultural approaches of recruiting hackers on open forums are detailed.
Nations currently have right of self-defense in case of armed attack. Cybersec czars have been difficult to find, e.g. in US, since they report to so many bosses. Existing laws are jus ad bellum for transition to war, and jus in bello for conduct during war. Cross-border attacks need to be prevented by host states or victims will respond. This can incite popular war with civilian networks participating in ground control of hubs and links. Fake news sites may post on real-time feeds. Malware-as-a-service turns a quick profit. In 5-8 years, digital natives will be military officers or trained for expert individual or group operations. Effects-analysis predicts denial of access, physical destruction, EM spectrum dominance, and psych manipulation. Broadband which has expanded in new regions such as Africa will increase the scale of the reach of botnets. Various threat scenarios are developed some which “shoot the hostage” and radically change types of operating systems and ISPs. Use of force in active defense is discussed, as well as need for rules of engagement and DEFCON model of readiness. Thanks.

Report as Inappropriate

Table of Contents



The publisher has provided additional content related to this title.


Visit the catalog page for Inside Cyber Warfare

  • Catalog Page

Visit the errata page for Inside Cyber Warfare

  • Errata