Introduction to Cyber-Warfare
Fig. 1. Introduction to Cyber-Warfare. Courtesy of Syngress, 2013.

Syngress published a book titled "Introduction to Cyber-Warfare: A Multidisciplinary Approach" written by Paulo Shakarian, Jana Shakarian and Andrew Ruef.

Publication Data

Shakarian, Paulo; Shakarian, Jana; and Ruef, Andrew. Introduction to Cyber-Warfare: A Multidisciplinary Approach. Syngress, 2013. ISBN: 9780124078147.


Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.

Key Features:

- Provides a multi-disciplinary approach to cyber-warfare, analyzing the information technology, military, policy, social, and scientific issues that are in play
- Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran)
- Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec
- Covers cyber-attacks directed against infrastructure, such as water treatment plants and power-grids, with a detailed account of Stuxent

Table of Contents

Chapter 1. Introduction
Part I
Chapter 2. Cyber Attack in an Inter-State Conflict
Chapter 3. Cyber Attack in Conjunction with Conventional Military Operations :
Chapter 4. Cyber Attack in Support of Information Operations:
Chapter 5. Cyber Attack Against Internal Dissidents
Chapter 6. Cyber Attacks by Non-State Hacking Groups
Part II
Chapter 7. Chinese Attributed Cyber Espionage
Chapter 8. Hacking Unmanned Aerial Vehicles
Chapter 9. Social Network Exploitation: Theory and Practice
Chapter 10. The Next Generation of Cyber Exploitation
Chapter 11. Chapter 12 – Case Study
Part III
Chapter 11. Industrial Control Systems
Chapter 12. Cyber Attacks on the Power Grid
Chapter 13. Stuxnet
Chapter 14. Conclusion and the Future of Cyber War

To order the book online visit Elsevier website.