‏220.00 ₪

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners 1

‏220.00 ₪
ISBN13
9780124166721
יצא לאור ב
Rockland, MA
מהדורה
1
זמן אספקה
21 ימי עסקים
עמודים
324
פורמט
Paperback / softback
תאריך יציאה לאור
22 בנוב׳ 2013
מחליף את פריט
9781597496377
Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks.
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.
מידע נוסף
מהדורה 1
עמודים 324
מחליף את פריט 9781597496377
פורמט Paperback / softback
ISBN10 0124166725
יצא לאור ב Rockland, MA
תאריך יציאה לאור 22 בנוב׳ 2013
תוכן עניינים Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline
זמן אספקה 21 ימי עסקים