REFERENCE

Cyber Warfare: A Reference Handbook

Bloomsbury Academic. (Contemporary World Issues). 2nd. ed. Jul. 2024. 272p. Tr $75. ISBN 9781440879708.
COPY ISBN
Gr 9 Up–An accessible yet comprehensive dive into the evolving world of cybersecurity and digital conflict. Aimed at readers seeking a foundational understanding of the subject, this updated edition deftly balances scholarly rigor with readability, making it a strong addition to reference collections for libraries serving students, researchers, and general audiences alike. The book begins with a historical perspective, focusing on the roots of modern cyberwarfare during World War I and II, highlighted with visuals such as an Enigma machine. While acronym-heavy, the text remains approachable, thanks to Springer’s clear explanations and a robust glossary that unpacks terminology and jargon. A detailed chronology, spanning 1948 to 2023, further situates readers in the time line of cybersecurity’s development. Springer’s exploration of cyber vulnerabilities is particularly compelling. A standout chapter profiles key individuals, organizations, and groups involved in cybersecurity and cyberwarfare. These range from household names like Google and CrowdStrike to infamous entities like Fancy Bear, a Russian hacking collective. A well-curated section of primary documents provides readers with treaties, executive orders, Department of Defense reports, and testimony on key issues, such as Russian interference in the 2016 U.S. presidential election. Springer’s inclusion of both print and online resources, each accompanied by concise descriptions of their origin and purpose, makes this a practical guide for further exploration. Springer paints a chilling picture of a constant state of conflict, driven by human and automated efforts to undermine individuals, corporations, and nations for nefarious gain.
VERDICT Well documented with extensive footnotes, a bibliography, and further reading suggestions for each chapter, this is a valuable resource for understanding the ongoing, pervasive nature of cyber threats.

Be the first reader to comment.

Comment Policy:
  • Be respectful, and do not attack the author, people mentioned in the article, or other commenters. Take on the idea, not the messenger.
  • Don't use obscene, profane, or vulgar language.
  • Stay on point. Comments that stray from the topic at hand may be deleted.
  • Comments may be republished in print, online, or other forms of media.
  • If you see something objectionable, please let us know. Once a comment has been flagged, a staff member will investigate.


RELATED 

ALREADY A SUBSCRIBER?

We are currently offering this content for free. Sign up now to activate your personal profile, where you can save articles for future viewing

ALREADY A SUBSCRIBER?