Skip to main content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Welcome to the CW2 Christopher G. Nason Military Intelligence Library Intelligence Operations in the Cyber Domain Bibliography.
- This list of books was created in partnership with the Civilian Support Council (CSC) and their January 2021 guest speaker, Mr Marvin Leal, who provided his recommended books, see below. To find more books on the topic available through your library, click on the More Resources tabs.
- Print books can be reserved for pickup via phone. Call 533-4100 to set up a time.
- Ebooks are available 24/7 via our homepage. If you need an account or help call us at 533-4100.
Cybersecurity and cyberwar : what everyone needs to know by
Call Number: eBook
Publication Date: 2014
Noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity and Cyberwar is the definitive account on the subject for the educated layman who wants to know more about the nature of war, conflict, and security in the twenty first century.
Dark territory : the secret history of cyber war by
Call Number: HV6773.15 .C97 K37 2016
Publication Date: 2017
In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer security. From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant role, Dark Territory chronicles a little-known past that shines an unsettling light on our future. Fred Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the "information warfare" squads of the military services, and the national security debates in the White House to reveal the details of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning--and (more often than people know) fighting--these wars for decades.
Future Crimes: everything is connected, everyone is vulnerable, and what we can do about it by
Call Number: HV6773 .G66 2015
Publication Date: 2015
One of the world's leading authorities on global security, Marc Goodman takes readers deep into the digital underground to expose the alarming ways criminals, corporations, and even countries are using new and emerging technologies. Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims' every move.
Ghost Fleet: a novel of the next world war by
Call Number: PS3619 .I572455 G48 2016
Publication Date: 2016
Ghost Fleet is a page-turning imagining of a war set in the not-too-distant future. Navy captains battle through a modern-day Pearl Harbor; fighter pilots duel with stealthy drones; teenage hackers fight in digital playgrounds; Silicon Valley billionaires mobilize for cyber-war; and a serial killer carries out her own vendetta. Ultimately, victory will depend on who can best blend the lessons of the past with the weapons of the future. But what makes the story even more notable is that every trend and technology in book--no matter how sci-fi it may seem--is real. The debut novel by two leading experts on the cutting edge of national security, Ghost Fleet has drawn praise as a new kind of techno-thriller while also becoming the new "must-read" for military leaders around the world.
The Perfect Weapon by
Call Number: HV6773.15 .C97 S36 2018
Publication Date: 2018
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents--Bush and Obama--drew first blood with Operation Olympic Games, which used malicious code to blow up Iran's nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump's first year, turned back on the United States and its allies. And if Obama would begin his presidency by helping to launch the new era of cyberwar, he would end it struggling unsuccessfully to defend against Russia's broad attack on the 2016 US election.