Search
Search
Login
The Cyber Defense Review
  • About
    • Editorial Board
    • West Point Press
    • Army Cyber Institute
  • Issues & Articles
    • Current Issue
    • Articles
    • Blog Posts
    • Book Reviews
  • Publish
    • Instructions for Authors
    • Open Access Policy
    • Call for Papers
    • Reviewer Guidelines
    • Go to Submission Site

​

BOOK REVIEWS

  • Cyber Persistence Theory: Redefining National Security in Cyberspace By Michael P. Fischerkeller, Emily O. Goldman, and Richard Harknett
  • The Smartest Person in the Room: The Root Cause and New Solution for Cybersecurity by Christian Espinoza
  • The Fifth Domain: Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats by Richard A. Clarke and Robert K. Knake
  • Cyberspace in Peace and War, 2nd Edition (Book Review)
  • Bitskrieg: The New Challenge of Cyberwarfare
  • Outsourcing War to the Machines: The Military Robotics Revolution
  • Censored: Distraction and Diversion Inside China’s Great Firewall - Reviewed by Cadet Tommy Hall
  • Bytes, Bombs, and Spies: The Strategic Dimensions of Offensive Cyber Operations
  • Cybercrime and Society Third Edition: Book Review
  • Book Review: Dawn of the Code War
  • Code Girls: The Untold Story of the American Women Code Breakers of World War II
  • Book Review: On Cyber: Towards an Operational Art for Cyber Conflict
  • Book Review: Pushing Limits: From West Point to Berkeley & Beyond
  • Book Review: Cyber War
  • Book Review: Black Code: Surveillance, Privacy, and the Dark Side of the Internet
  • Book Review: Data and Goliath: The Hidden Battles to Collect Your Data and Control your World
  • Book Review: Dark Territory: The Secret History of Cyber War
  • Book Review: Ghost Fleet – Scary, Accessible, Entertaining and Plausible – The Future Implications of Cyber Attacks
More News
Copyright (c) 2025 The Cyber Defense Review
Terms Of Use | Privacy Statement