CyberWar, CyberTerror, CyberCrime and CyberActivism, Second Edition

CyberWar, CyberTerror, CyberCrime and Cyberactivism, Second Edition
  • Understand how to combine procedures, policies and technology to dramatically improve your cyber defences
  • Find out how to build a culture of security awareness to identify and deal with risks more quickly
  • Learn how to adopt international best practice that complements your technology-based defences
Ready to order
Sub Total: 0,00 € (EUR)

American Express is only available to customers paying in Euros or NOK. We do not yet accept American express for Kuna.

Other payment options available


Develop better cybersecurity by taking a wider view of the threats

Many books on cybersecurity focus on technical responses to the cybercriminal, the cyberactivist and the state-sponsored hacker. As important as this is, relatively inexperienced hackers can still break into systems that have not taken account of human fallibility and other known vulnerabilities.

Cyber security is much more than technology

CyberWar, CyberTerror, CyberCrime and CyberActivism encourages cybersecurity professionals to take a wider view of what cybersecurity means, and to make the most of international standards and best practice to create a culture of cybersecurity awareness that complements technology-based defences.

This second edition analyses the changing threats in the cyber landscape, and includes an updated body of knowledge that describes how to acquire, develop, and sustain a secure information environment that goes beyond technology and create a cyber-aware organisational culture that is more robust and better able to deal with a wider range of threats.


1. Technology Is a Double-Edged Sword; 2. Cyber attack: It's A Dangerous World for Information Systems; 3. The Human Factor: The Underrated Threat; 4. Transition from an Environment of "FUD" to a Standards-Based Environment; 5. Establishing a Culture of Cyber Security; 6. Increasing Internationalism: Governance, Laws, and Ethics; 7. Standards: What are They and Why Should We Care; 8. From Reaction to Proaction: Applying Standards in an Environment of Change and Danger; 9. Conclusion: Where Do We Go From Here?; Appendix 1: Gap Analysis Areas of Interest; Appendix 2: Standards Crosswalk

About the author

Dr Julie Mehan is the Founder and President of JEMStone Strategies and a Principal in a strategic consulting firm in the State of Virginia. She has delivered cybersecurity and related privacy services to senior commercial, department of defence and federal government clients working in Italy, Australia, Canada, Belgium, and the United States. Dr Mehan is also an Associate Professor at the University of Maryland University College, specializing in courses in Cybersecurity, Cyberterror, IT in Organizations and Ethics in an Internet Society.

Product Rating: (4,00)   # of Ratings: 1   (Only registered customers can rate)

There are no comments for this product.

EU GDPR – A Pocket Guide
EU GDPR – A Pocket Guide
The psychology of information security
The Psychology of Information Security - Resolving conflicts between security compliance and human behaviour
The True Cost of Information Security Breaches and Cyber Crime
The True Cost of Information Security Breaches and Cyber Crime
The Case for ISO 27001 (2013) Second Edition
The Case for ISO 27001 (2013) Second Edition