Search Results - hack writer~
Suggested Topics within your search.
Suggested Topics within your search.
-
1
-
2
-
3
Introduction to cyber-warfare a multidisciplinary approach
Published 2013Table of Contents: “…Industrial Control Systems: Why Traditional Infosec Practices May Not Apply -- How Real-World Dependencies Can Magnify an Attack: Infrastructure Attacks and Network Topology -- How a Cyber Attack Led to Water Contamination The Maroochy Water Breach -- Summary -- Suggested Further Reading -- 12.Can Cyber. …”
Book -
4
Information security and IT risk management
Published 2014Table of Contents: “…ch. 1 Introduction -- Overview -- Professional utility of information security knowledge -- Brief history -- Definition of information security -- Summary -- Example case -- Wikileaks, Cablegate, and free reign over classified networks -- Chapter review questions -- Example case questions -- Hands-on activity -- Software Inspector, Steganography -- Critical thinking exercise: identifying CIA area(s) affected by sample real-life hacking incidents -- Design case -- ch. 2 System Administration (Part 1) -- Overview -- Introduction -- What is system administration? …”
Book -
5
-
6


