Entry Level - EnlistedEntry Level - Officer
Primary Level - EnlistedPrimary Level - Officer
Career Level - EnlistedCareer Level - Officer
Intermediate Level - EnlistedIntermediate Level - Officer
Senior Level - EnlistedSenior Level - Officer
AviationCounterinsurgencyCyberwarfare & SecurityLeadershipLogisticsRegional and Cultural StudiesRoots of Maneuver WarfareStrategic ThinkingWounded Warrior/Resiliency
This is the "Cyberwarfare & Security" page of the "Commandant's Professional Reading List - Official Site" guide.
Alternate Page for Screenreader Users
Skip to Page Navigation
Skip to Page Content

Commandant's Professional Reading List - Official Site  

Official site of the Marine Corps Commandant's Professional Reading List per ALMAR 009-16. This site outlines the annual and recommended reading requirements for all Marines.
Last Updated: May 18, 2017 URL: http://guides.grc.usmcu.edu/usmcreadinglist Print Guide Email Alerts

Cyberwarfare & Security Print Page
  Search: 
 
 

Cyberwarfare & Security


ALMAR 009-16 Guidance

Books listed under Professional Categories consist of recommended readings to expand understanding in certain areas.

  

Cover Art
AMERICA THE VULNERABLE : INSIDE THE NEW THREAT MATRIX OF DIGITAL ESPIONAGE, CRIME, AND WARFARE - Joel Brenner
USMC MCCS BASE LIBRARIES: Search for copies
QUANTICO/USMC RESEARCH LIBRARY: Click on title for available copies and formats

A former top-level national Security Agency insider evaluates pressing threats in digital security, revealing how operatives from hostile nations have infiltrated power, banking, and military systems to steal information and sabotage defense mechanisms.

Cover Art
COUNTDOWN TO ZERO DAY - Kim Zetter  Icon  Icon
FREE ONLINE: Navy Digital Library - at One Click Digital and OverDrive
USMC MCCS BASE LIBRARIES: Search for copies
QUANTICO/USMC RESEARCH LIBRARY: Click on title for available copies and formats

"Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran's nuclear efforts and shows how its existence has ushered in a new age of warfare--one in which a digital attack can have the same destructive capability as a megaton bomb. In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery--apparently as much to the technicians replacing the centrifuges as to the inspectors observing them. Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly. At first, the firm's programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity. They had, they soon learned, stumbled upon the world's first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility. In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnet's planning, execution, and discovery, covering its genesis in the corridors of Bush's White House and its unleashing on systems in Iran--and telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making. But Countdown to Zero Day ranges far beyond Stuxnet itself.

Cover Art
CYBER WAR - Richard A. Clarke; Robert Knake  Icon  Icon  Icon
FREE ONLINE: Navy General Library Program
USMC MCCS BASE LIBRARIES: Search for copies
QUANTICO/USMC RESEARCH LIBRARY: Click on title for available copies and formats

Security expert Richard A. Clarke goes beyond "geek talk" to succinctly explain how cyber weapons work and how vulnerable America is to the new world of nearly untraceable cyber criminals and spies. This sobering story of technology, government, and military strategy involving criminals, spies, soldiers, and hackers begins the much needed public policy debate about what America's doctrine and strategy should be, not just for waging, but for preventing the First Cyber War.

Cover Art
CYBERPOWER AND NATIONAL SECURITY - Franklin D. Kramer (Editor); et al.  Icon  Icon
FREE ONLINE: Navy General Library Program
USMC MCCS BASE LIBRARIES: Search for copies
QUANTICO/USMC RESEARCH LIBRARY: Click on title for available copies and formats

The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas. The first section provides a broad foundation and overview of the subject by identifying key policy issues, establishing a common vocabulary, and proposing an initial version of a theory of cyberpower. The second section identifies and explores possible changes in cyberspace over the next fifteen years by assessing cyber infrastructure and security challenges. The third section analyzes the potential impact of changes in cyberspace on the military and informational levers of power. The fourth section addresses the extent to which changes in cyberspace serve to empower key entities such as transnational criminals, terrorists, and nation-states. The final section examines key institutional factors, which include issues concerning governance, legal dimensions, critical infrastructure protection, and organization. Cyberpower and National Security frames the key issues concerned and identifies the important questions involved in building the human capacity to address cyber issues, balancing civil liberties with national security considerations, and developing the international partnerships needed to address cyber challenges. With more than two dozen contributors, Cyberpower and National Security covers it all.

Cover Art
GHOST FLEET: A NOVEL OF THE NEXT WORLD WAR - P. W. Singer; August Cole  Icon  Icon
FREE ONLINE: Navy General Library Program
USMC MCCS BASE LIBRARIES: Search for copies
QUANTICO/USMC RESEARCH LIBRARY: Click on title for available copies and formats

"What will the next global conflict look like? Find out in this ripping, near-futuristic thriller. The United States, China, and Russia eye each other across a twenty-first century version of the Cold War, which suddenly heats up at sea, on land, in the air, in outer space, and in cyberspace. The fighting involves everything from stealthy robotic-drone strikes to old warships from the navy's "ghost fleet." Fighter pilots unleash a Pearl Harbor-style attack; American veterans become low-tech insurgents; teenage hackers battle in digital playgrounds; Silicon Valley billionaires mobilize for cyber-war; and a serial killer carries out her own vendetta. Ultimately, victory will depend on blending the lessons of the past with the weapons of the future. Ghost Fleet is a page-turning speculative thriller in the spirit of The Hunt for Red October. The debut novel by two leading experts on the cutting edge of national security, it is unique in that every trend and technology featured in the novel -- no matter how sci-fi it may seem -- is real, or could be soon."-- Provided by publisher.

Cover Art
INSIDE CYBER WARFARE - Jeffrey Carr  Icon  Icon
FREE ONLINE: Navy General Library Program
USMC MCCS BASE LIBRARIES: Search for copies
QUANTICO/USMC RESEARCH LIBRARY: Click on title for available copies and formats

When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a glimpse into modern cyber warfare without truly realizing the scope of this global conflict. Inside Cyber Warfare provides details on how nations, groups, and individuals throughout the world increasingly rely on Internet attacks to gain military, political, and economic advantages over their adversaries. This updated second edition takes a detailed look at the complex domain of cyberspace, and the players and strategies involved. You'll discover how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. Discover how Russian investment in social networks benefits the Kremlin. Learn the role of social networks in fomenting revolution in the Middle East and Northern Africa. Explore the rise of anarchist groups such as Anonymous and LulzSec. Look inside cyber warfare capabilities of nations including China and Israel. Understand how the U.S. can legally engage in covert cyber operations. Learn how the Intellectual Property war has become the primary focus of state-sponsored cyber operations.

Cover Art
WIRED FOR WAR: THE ROBOTICS REVOLUTION AND CONFLICT IN THE TWENTY-FIRST CENTURY - P. W. Singer  Icon  Icon  Icon
FREE ONLINE: Navy General Library Program
USMC MCCS BASE LIBRARIES: Search for copies
QUANTICO/USMC RESEARCH LIBRARY: Click on title for available copies and formats

A military expert (and author of Ghost Fleet) reveals how science fiction is fast becoming reality on the battlefield, changing not just how wars are fought, but also the politics, economics, laws, and ethics that surround war itself.

Description

Loading  Loading...

Tip