Cyber warfare techniques, tactics and tools for security practitioners
This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and...
Saved in:
| Main Authors: | Andrees, Jason (Author), Winterfeld, Steve (Author) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Waltham, MA
Syngress is an imprint of Elsevier
© 2014
|
| Edition: | Second edition |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice
by: Winterfeld, Steve
Published: (2013)
by: Winterfeld, Steve
Published: (2013)
Information warfare and electronic warfare systems
by: Poisel, Richard A.
Published: (2013)
by: Poisel, Richard A.
Published: (2013)
Introduction to cyber-warfare a multidisciplinary approach
by: Shakarian, Paulo, et al.
Published: (2013)
by: Shakarian, Paulo, et al.
Published: (2013)
Cyber security basics protect your organization by applying the fundamentals
by: Franke, Don
Published: (2016)
by: Franke, Don
Published: (2016)
The virtual battlefield perspectives on cyber warfare
Published: (2009)
Published: (2009)
Social media warfare equal weapons for all
by: Erbschloe, Michael
Published: (2017)
by: Erbschloe, Michael
Published: (2017)
Asymmetric warfare lawless violence
by: Kumkale, Tahir Tamer
Published: (2014)
by: Kumkale, Tahir Tamer
Published: (2014)
Cyberdeterrence and cyberwar
by: Libicki, Martin C.
Published: (2009)
by: Libicki, Martin C.
Published: (2009)
Emergency action for chemical and biological warfare agents
by: Ellison, D. Hank
Published: (2016)
by: Ellison, D. Hank
Published: (2016)
Handbook of chemical and biological warfare agents
by: Ellison
Published: (2008)
by: Ellison
Published: (2008)
Asymmetric warfare threat and response in the twenty-first century
by: Thornton, Rod
Published: (2007)
by: Thornton, Rod
Published: (2007)
Conflict in cyber space theoretical, strategic and legal perspectives
Published: (2016)
Published: (2016)
Hybrid warfare fighting complex opponents from the ancient world to the present
Published: (2012)
Published: (2012)
Principles of asymmetrical warfare how to beat Islamo-fascists their own game
by: Uda, Robert T.
Published: (2007)
by: Uda, Robert T.
Published: (2007)
Information operations warfare and the hard reality of soft power
Published: (2004)
Published: (2004)
The complexity of modern asymmetric warfare
by: Manwaring, Max G.
Published: (2012)
by: Manwaring, Max G.
Published: (2012)
The web application hacker's handbook finding and exploiting security flaws
by: Stuttard, Dafydd 1972-, et al.
Published: (2011)
by: Stuttard, Dafydd 1972-, et al.
Published: (2011)
Handbook of research on information security and assurance
Published: (2009)
Published: (2009)
Cyber conflict in new era the future of war and security
by: Mohd. Aziizulazmi Nuran
by: Mohd. Aziizulazmi Nuran
Social media and military in relation to national security a case study of Malaysian Armed Forces
by: Muhammad Yurehendra Mohd. Bachuri
by: Muhammad Yurehendra Mohd. Bachuri
The computer incident response planning handbook executable plans for protecting information at risk
by: McCarthy, N.K
Published: (2012)
by: McCarthy, N.K
Published: (2012)
U.S. Army counterinsurgency handbook
Published: (2007)
Published: (2007)
Globalization and assymmetrical warfare
by: Hartman, William J.
Published: (2002)
by: Hartman, William J.
Published: (2002)
Handbook of measurements benchmarks for systems accuracy and precision
Published: (2016)
Published: (2016)
U.S. Army counterinsurgency warrior handbook
Published: (2014)
Published: (2014)
Handbook of temperature measurement the theory and practice of thermoelectrics thermometry
Published: (1998)
Published: (1998)
Handbook of optical metrology principles and applications
Published: (2015)
Published: (2015)
Networking the complete reference
by: ZackerlhCraig
by: ZackerlhCraig
U.S. Army desert operations handbook
Published: (2013)
Published: (2013)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbook
Published: (2012)
Published: (2012)
Information security management handbook
Published: (2007)
Published: (2007)
Information security management handbooks
by: lh
by: lh
The Cabling Handbook
by: Vacca,John
Published: (1999)
by: Vacca,John
Published: (1999)
Malware forensics field guide for Linux systems digital forensics field guides
by: Malin, Cameron H
Published: (2014)
by: Malin, Cameron H
Published: (2014)
Handbook of IPv4 to IPv6 transition methodologies for institutional and corporate networks
by: Amoss, John 1941-
Published: (2008)
by: Amoss, John 1941-
Published: (2008)
Technology for classroom and online learning an educator's guide to bits, bytes, and teaching
by: Kwon, Samuel M., et al.
Published: (2016)
by: Kwon, Samuel M., et al.
Published: (2016)
Instrument engineers' handbook process control and optimization : volume II
Published: (2006)
Published: (2006)
Chemical properties handbook physical thermodynamic, environmental, transport, safety and, health related properties for organic and organic chemicals
by: Yaws, Carl L
Published: (1999)
by: Yaws, Carl L
Published: (1999)
THE SURVIVAL HANDBOOK ESSENTIAL SKILLS FOR OUTDOOR ADVENTURE
by: Towell, Colin
by: Towell, Colin
Similar Items
-
The basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice
by: Winterfeld, Steve
Published: (2013) -
Information warfare and electronic warfare systems
by: Poisel, Richard A.
Published: (2013) -
Introduction to cyber-warfare a multidisciplinary approach
by: Shakarian, Paulo, et al.
Published: (2013) -
Cyber security basics protect your organization by applying the fundamentals
by: Franke, Don
Published: (2016) -
The virtual battlefield perspectives on cyber warfare
Published: (2009)


