Skip to main content

Digital Defense

A Cybersecurity Primer

  • Book
  • © 2015


  • Outlines the three major categories of cyber attack: personal attacks, such as malware installation or identity theft; attacks on company or community infrastructure; and attacks on a national government

  • Experienced and highly regarded authors are uniquely qualified on the subject, having previously authored "The Safe City: Living Free in a Dangerous World" about urban security; here they expand their focus to individuals

  • Explains the causes of computer vulnerability and offers specific advice on what to look for when assessing risk and key protective actions that all users can take to guard against security breaches

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 19.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 27.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 27.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard against individual security breaches. This guide clearly explains the technology at issue, the points of weakness and the best ways to proactively monitor and maintain the integrity of individual networks. Covering both the most common personal attacks of identity fraud, phishing, malware and breach of access as well as the larger threats against companies and governmental systems, the authors explain the vulnerabilities of the internet age. As more and more of life's transactions take place online, the average computer user and society at large have a lot to lose. All users can take steps to secure their information. Cybercrime is so subtle and hidden, people can ignore the threat until it is too late. Yet today about every three seconds a person is hit by some form of cyber attack out of the blue. Locking the “cyber-barn door” after a hacker has struck is way too late. Cyber security, cyber crime and cyber terrorism may seem to be intellectual crimes that don't really touch the average person, but the threat is real. Demystifying them is the most important step and this accessible explanation covers all the bases.

Similar content being viewed by others


Table of contents (8 chapters)


“Digital defense is a well-written, easy-to-follow, practical book, suitable for personal as well as professional use. … the authors also provide the necessary data to help us make better decisions regarding selecting vacation destinations and hotels or products by reading the reviews of other customers. … Overall, this is a useful handbook for daily digital life.” (Sandhya Jane, Computing Reviews, January, 2017)

“The goal of this helpful resource is to explain the importance of cybersecurity to anyone using a computer or mobile device. … The most valuable aspect is the authors’ holistic approach. … They present concepts in easily understood language, define potential threats, and describe concrete steps to defend against and reduce exposures. … Summing Up: Highly recommended. Lower-division undergraduates, two-year technical program students, and general readers.” (M. B. DuBois, Choice, Vol. 53 (10), June, 2016)

“Written for a general audience, with end-of-chapter references for the more technically and detail minded, readers will be pleased to place this excellent presentation on their bookshelves. … This excellent presentation is readable by novices. It is so well rounded that even a seasoned professional will be reminded of issues to address. … Readers will enjoy and learn from this book.” (Brad Reid, Computing Reviews, December, 2015)

Authors and Affiliations

  • Executive Board, Advancement of Space Safely, Arlington, USA

    Joseph Pelton

  • LATA’s Global Institute for Security Training, Los Alamos Technical Associates, McLean, USA

    Indu B. Singh

About the authors

Indu B. Singh, Ph.D., is currently Vice President of Los Alamos Technical Associates (LATA) and head of its Washington, D.C. Operations. His responsibilities include expanding LATA’s presence in the Security and Public Safety sectors, both domestically and internationally. He also serves as Executive Director of LATA’s Global Institute for Security Training (GIST). Indu served as Director for Systems Engineering and WMD for Deloitte USA. Previously, he served as a Managing Partner at Bearing Point, a publicly traded company, prior to its acquisition by Deloitte Consulting.

Dr. Singh is considered a pioneer in the designing and implementing Smart Cities and Safe Cities around the world as well as Urban Security. In 2009 he joined with Dr. Pelton in writing Future Cities as a project for the Intelligent Community Forum headquartered in New York City. In 2014 he again teamed with Dr. Pelton to write The Safe City: Living Free in a Dangerous World. Dr. Singh has published several books on communications, IT systems and security and is a former faculty member of Rutgers University. He is also a former Strategic Director for James Martin and Associates, a global information engineering corporation. Dr. Singh is a recognized expert on solution engineering, health IT, cyber security and public safety.

Joseph N. Pelton, Ph.D., is the principal of Pelton Consulting International. He is the former Dean and Chairman of the Board of Trustees of the International Space University and Director Emeritus of the Space and Advanced Communications Research Institute (SACRI) at George Washington University. Dr. Pelton was the Director of the Interdisciplinary Telecommunications Program at the University of Colorado from 1988 to 1997, and at the time it was the largest such graduate program in the U.S. He previously held various executive positions at Intelsat and Comsat, including serving as Director of Project SHARE and Director of Strategic Policy for Intelsat. Intelsat’s Project SHARE gave birth to the Chinese National TV University. Dr. Pelton was the founder of the Arthur C. Clarke Foundation and remains as the Vice Chairman on its Board of Directors. He was also the founding President of the Society of Satellite Professionals (SSPI) and has been recognized in the SSPI Hall of Fame. He has served as President of the Arlington County Civic Federation, as a member of its Long Range Planning Commission that initiated “smart growth” in Arlington and is also Chair of the IT Advisory Commission for Arlington County.
Pelton is a widely published award winning author with some 40 books written, co-authored or co-edited. His Global Talk won the Eugene Emme Literature Award and was nominated for a Pulitzer Prize. He is on the Advisory Board of the World Future Society and also frequently speaks and writes as a futurist.  Dr. Pelton is a member of the International Academy of Astronautics, an Associate Fellow of the American Institute of Aeronautics and Astronautics (AIAA) and a Fellow of the International Association for the Advancement of Space Safety (IAASS).

Bibliographic Information

  • Book Title: Digital Defense

  • Book Subtitle: A Cybersecurity Primer

  • Authors: Joseph Pelton, Indu B. Singh

  • DOI:

  • Publisher: Copernicus Cham

  • eBook Packages: Engineering, Engineering (R0)

  • Copyright Information: Springer International Publishing Switzerland 2015

  • Hardcover ISBN: 978-3-319-19952-8Published: 03 November 2015

  • Softcover ISBN: 978-3-319-79291-0Published: 13 March 2019

  • eBook ISBN: 978-3-319-19953-5Published: 16 October 2015

  • Edition Number: 1

  • Number of Pages: XX, 209

  • Number of Illustrations: 6 b/w illustrations, 36 illustrations in colour

  • Topics: Popular Science in Technology, Systems and Data Security, Communications Engineering, Networks

Publish with us