Cyber warfare techniques, tactics and tools for security practitioners

This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and...

Full description

Saved in:
Bibliographic Details
Main Authors: Andrees, Jason (Author), Winterfeld, Steve (Author)
Format: Book
Language:English
Published: Waltham, MA Syngress is an imprint of Elsevier © 2014
Edition:Second edition
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000nam a2200000 i 4500
001 100779
003 MY-KLNDU
005 20241220025554.0
008 221104 2014 maua bi 000 0 eng d
020 |a 9780124166721 (pbk.) 
039 9 |a 202211041125  |b VLOAD  |c 201411200842  |d faezah  |c 201411191135  |d faezah  |c 201411191134  |d faezah  |y 201410131950  |z syarifuddin 
040 |a UPNM  |b eng  |c UPNM  |e rda 
090 |a U 163  |b .A64 2014 
100 1 |a Andrees, Jason  |e author 
245 1 0 |a Cyber warfare  |b techniques, tactics and tools for security practitioners  |c Jason Andress, Steve Winterfeld 
246 3 0 |a Cyberwarfare, techniques, tactics and tools for security practitioners 
250 |a Second edition 
264 1 |a Waltham, MA  |b Syngress is an imprint of Elsevier  |c © 2014 
300 |a xvii, 306 pages  |b illustrations  |c 24 cm 
336 |a text  |2 rdacontent 
337 |a unmediated  |2 rdamedia 
338 |a volume  |2 rdacarrier 
504 |a Includes bibliographical references and index 
505 0 |a 1. What is cyber warfare? -- 2. Cyber threatscape -- 3. The cyberspace battlefield -- 4. Cyber doctrine -- 5. Cyber warriors -- 6. Logical weapons -- 7. Physical weapons -- 8. Psychological weapons -- 9. Computer network exploitation -- 10. Computer network attack -- 11. Computer network defense -- 12. Non-state actors in computer network operations -- 13. Legal system impacts -- 14. Ethics -- 15. Cyberspace challenges --16. The future of cyber war 
520 |a This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists 
592 |a 00013726  |b 04/11/2014  |c RM 159.80  |h PVK 
650 0 |a Information warfare  |v Handbooks, manuals, etc 
650 0 |a Computer networks  |x Security measures  |v Handbooks, manuals, etc 
700 1 |a Winterfeld, Steve  |e author 
999 |a vtls000052933  |c 100779  |d 100779