We are currently upgrading our print fulfillment systems. Print book orders placed between Sept 22 and Oct 9 will be delayed. Delivery of these orders will start on Oct 10, with purchases being fulfilled in the order received. Buy the Print and get eBook immediately for FREE. Use Code BOGO. Or save up to 40% on all orders with code: DELTA. Exclusions apply. Click here for terms and conditions.
Introduction to Cyber-Warfare

Introduction to Cyber-Warfare, 1st Edition

A Multidisciplinary Approach

Introduction to Cyber-Warfare, 1st Edition,Paulo Shakarian,Jana Shakarian,Andrew Ruef,ISBN9780124078147

  &      &      





235 X 191

Written by experts, explains how cyber-warfare has been performed, why it is the new means of warfare and the relevant military, policy, social, and scientific issues at play

Print Book + eBook

USD 59.94
USD 99.90

Buy both together and save 40%

Print Book


In Stock

Estimated Delivery Time
USD 49.95

eBook Overview

VST format:

DRM Free included formats: EPub, Mobi, PDF

USD 49.95
Add to Cart

Key Features

  • Provides a multi-disciplinary approach to cyber-warfare, analyzing the information technology, military, policy, social, and scientific issues that are in play
  • Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran)
  • Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec
  • Covers cyber-attacks directed against infrastructure, such as water treatment plants and power-grids, with a detailed account of Stuxent


Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.


Information security professionals, system administrators. Security managers, security analysts. defense analysts, defense personnel, U.S Cybercom staff

Paulo Shakarian

Paulo Shakarian, Ph.D. is a Major in the U.S. Army and an Assistant Professor of Computer Science at the U.S. Military Academy (West Point) teaching classes on computer science and information technology as wells as conducting research on cyber-security, social networks, and artificial intelligence. He has written over twenty papers published in scientific and military journals. Relating to cyber-warfare, he has written the paper “Stuxnet: Cyberwar Revolution in Military Affairs” published in Small Wars Journal and “The 2008 Russian Cyber-Campaign Against Georgia” published in Military Review. His scientific research has also been well received, featured in major news media such including The Economist and Nature. Previously, he has authored Geospatial Abduction: Principles and Practice published by Springer. Paulo holds a Ph.D. and M.S. in computer science from the University of Maryland, College Park, a B.S. in computer science from West Point, and a Depth of Study in Information Assurance also from West Point. Paulo has served two combat tours in Operation Iraqi Freedom. His military awards include the Bronze Star, Meritorious Service Medal, Army Commendation Medal with Valor Device, and Combat Action Badge. Paulo’s website is: http://shakarian.net/paulo.

Jana Shakarian

Jana Shakarian is a Research Fellow at the West Point Network Science Center conducting sociological research in support of various DoD-sponsored projects. Previously, Jana has worked as a research assistant at Laboratory for Computational Cultural Dynamics at the University of Maryland where she extensively studied terrorist groups in south-east Asia in addition to other research initiatives at the intersection of social and computational science applied to military and security problems. She has written numerous papers in addition to co-authoring the book Computational Analysis of Terrorist Groups: Lashkar-e-Tabia, to be published by Springer in the near future. Jana holds an M.A. in cultural and social anthropology and sociology from the Johannes Gutenberg University, Mainz where her thesis was on “new war” theory. Jana’s website is: http://shakarian.net/jana.

Andrew Ruef

Andrew Ruef is a Senior Systems Engineer at the firm Trail of Bits (New York, NY) where he conducts information security analysis. Andrew has nearly a decade of industry experience in computer network security and software engineering, working on various projects including reverse-engineering of malware, analysis of computer network traffic for security purposes, system administration, and development of secure software products. Andrew has also written numerous white papers on information security and has spoken at various conferences such including a recent conference talk at the Dagstuhl computer research center in Germany. Currently, Andrew is working toward his B.S. in Computer Science at the University of Maryland, College Park. A sampling of some of Andrew’s technical work can be found here: http://www.kyrus-tech.com/tag/andrew-ruef/.

Introduction to Cyber-Warfare, 1st Edition

Chapter 1 Introduction

Part I: Cyber Attack

Chapter 2 – Cyber Attack in an Inter-State Conflict

Chapter 3 – Cyber Attack in Conjunction with Conventional Military Operations :

Chapter 4 – Cyber Attack in Support of Information Operations:

Chapter 5 – Cyber Attack Against Internal Dissidents

Chapter 6 – Cyber Attacks by Non-State Hacking Groups

Part II Cyber Espionage and Exploitation

Chapter 7 – Chinese Attributed Cyber Espionage

Chapter 8 – Hacking Unmanned Aerial Vehicles

Chapter 9 – Social Network Exploitation: Theory and Practice

Chapter 10 The Next Generation of Cyber Exploitation

Chapter 11 –Chapter 12 – Case Study

Part III

Chapter 11 – Industrial Control Systems

Chapter 12 – Cyber Attacks on the Power Grid

Chapter 13 – Stuxnet

Chapter 14- Conclusion and the Future of Cyber War

Quotes and reviews

"What could easily have been a difficult and long-winded read, is nothing of the sort. The authors offer plenty of further reading and food for thought. They sum up: ‘We are only at the beginning of a new era of information security that will likely change many times before reaching some sort of steady state - if such a steady state is even possible.’"--Professional Security Magazine Online, March 31, 2014
"In each of the 13 chapters in this book, there is a brief presentation of a type of cyber attack, followed by a detailed account of what can happen as a result of the attack. The chapter then concludes with an actual case study of an attack using the method just described… I think the book should be on the shelf of every professional concerned with computer security."--ComputingReviews.com, December 26, 2013
"… Paulo Shakarian, Jana Shakarian, and Andrew Ruef, with backgrounds in the US military, academia, and industry, present a number of case studies of actual incidents of cyber warfare that have actually occurred. Most of these studies concern incidents that have occurred only since 2006 thus refuting the prior common view in the cyber security community that cyber warfare was largely a fiction created by media hype."--Reference & Research Book News, December 2013
"There are still many people who think that the whole concept of cyberwar is overhyped. This book is an excellent counter to that: it shows that cyberwar has the ability to disrupt our lives and our economy, and that it is being fought right now."--Network Security Newsletter, October 2013
"…I think it is a good start point for people to use this in their syllabus for teaching IW/CW today…We need a more informed populace as well as government and I think this book would be a good start."--Krypt3ia blog, August 30, 2013
"This book will give you a good base on the topic of cyber warfare and its different aspects… The military-style approach to the subject turned out to be perfect - the book is a balanced blend of history and technical details that makes it very easy to read."--HelpNetSecurity.org, July 24, 2013
"For Soldiers and leaders engaging in the ongoing battles of cyberspace, this book will be indispensable."--Lieutenant General (ret.) Charles P. Otstott
"The most thorough study to date of the many facets of cyber-warfare - for scholars and practitioners alike."--Gerardo I. Simari, Senior Researcher,
Dept. of Computer Science, University of Oxford

Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy