Cyber warfare techniques, tactics and tools for security practitioners
This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress is an imprint of Elsevier
© 2014
|
| Edition: | Second edition |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 100779 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241220025554.0 | ||
| 008 | 221104 2014 maua bi 000 0 eng d | ||
| 020 | |a 9780124166721 (pbk.) | ||
| 039 | 9 | |a 202211041125 |b VLOAD |c 201411200842 |d faezah |c 201411191135 |d faezah |c 201411191134 |d faezah |y 201410131950 |z syarifuddin | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a U 163 |b .A64 2014 | ||
| 100 | 1 | |a Andrees, Jason |e author | |
| 245 | 1 | 0 | |a Cyber warfare |b techniques, tactics and tools for security practitioners |c Jason Andress, Steve Winterfeld |
| 246 | 3 | 0 | |a Cyberwarfare, techniques, tactics and tools for security practitioners |
| 250 | |a Second edition | ||
| 264 | 1 | |a Waltham, MA |b Syngress is an imprint of Elsevier |c © 2014 | |
| 300 | |a xvii, 306 pages |b illustrations |c 24 cm | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 504 | |a Includes bibliographical references and index | ||
| 505 | 0 | |a 1. What is cyber warfare? -- 2. Cyber threatscape -- 3. The cyberspace battlefield -- 4. Cyber doctrine -- 5. Cyber warriors -- 6. Logical weapons -- 7. Physical weapons -- 8. Psychological weapons -- 9. Computer network exploitation -- 10. Computer network attack -- 11. Computer network defense -- 12. Non-state actors in computer network operations -- 13. Legal system impacts -- 14. Ethics -- 15. Cyberspace challenges --16. The future of cyber war | |
| 520 | |a This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists | ||
| 592 | |a 00013726 |b 04/11/2014 |c RM 159.80 |h PVK | ||
| 650 | 0 | |a Information warfare |v Handbooks, manuals, etc | |
| 650 | 0 | |a Computer networks |x Security measures |v Handbooks, manuals, etc | |
| 700 | 1 | |a Winterfeld, Steve |e author | |
| 999 | |a vtls000052933 |c 100779 |d 100779 | ||


