Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Person/Organisation
  • 1
    Online Resource
    Online Resource
    Hoboken, New Jersey :John Wiley & Sons, Inc.,
    UID:
    almafu_9961517736702883
    Format: 1 online resource (323 p.)
    ISBN: 9781119712114 , 1119712114 , 9781119712121 , 1119712122 , 9781119712107 , 1119712106
    Content: Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an ever-expanding digital footprint. Cyber technologies like voice-activated search, automated transport, and the Internet of Things are only broadening the interface between the personal and the online, which creates new challenges and new opportunities. Improving both user security and quality of life demands a rigorous, farsighted approach to cyber operations. Cyber Operations offers a groundbreaking contribution to this effort, departing from earlier works to offer a comprehensive, structured framework for analyzing cyber systems and their interactions. Drawing on operational examples and real-world case studies, it promises to provide both cyber security professionals and cyber technologies designers with the conceptual models and practical methodologies they need to succeed. Cyber Operations readers will also find: Detailed discussions of case studies including the 2016 United States Presidential Election, the Dragonfly Campaign, and more Coverage of cyber attack impacts ranging from the psychological to attacks on physical infrastructure Insight from an author with top-level experience in cyber security Cyber Operations is ideal for all technological professionals or policymakers looking to develop their understanding of cyber issues.
    Note: Description based upon print version of record. , Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Section I Cyber Operations Introduction -- I.1 Phases of Cyber Operations -- I.1.1 1980s-2002 -- I.1.2 2003-2012 -- I.1.3 2013-present -- Chapter 1 Cyber Operations -- 1.1 Cyber Operations Introduction -- 1.1.1 Cyber -- A 21st-Century Collection Channel -- 1.1.2 Hackers -- Pre-Cyber Operations -- 1.1.3 Cyber and Counter-Terror/Insurgency -- 1.2 Early Internet and Cyber Operations -- 1.2.1 Maturing of Cyber Operations -- ISIS and Russia -- 1.2.2 ISIS Cyber Operations -- 1.2.3 Russian Cyber Operations , 1.3 Cyber Operations' Stage Descriptions -- 1.3.1 Stage I (late 1990s-~2010)(Community Development) -- 1.3.2 Stage II (~2010-~2015)(Tactical) -- 1.3.3 Stage III (~2015 to present)(Tactical and Strategic) -- 1.4 Cyber Operations Wrap-up -- Bibliography -- Chapter 2 ISIS and Web-Based Insurgency -- 2.1 Introduction -- 2.1.1 Terrorist Development of the Internet for Messaging -- 2.1.2 ISIS Adaptation of the Internet for Coordination, Command and Control (C2) -- 2.1.3 ISIS "Emergence" from Cyberspace to form a State -- 2.2 Cyber-Based Irregular Operations , 2.2.1 Three-Phase Insurgency Model with Cyber -- ISIS Example -- 2.2.2 ISIS Insurgency Phases -- 2.2.3 Counter-ISIS Operations in Cyber -- 2.3 ISIS and Web-Based Insurgency Wrap-up -- Bibliography -- Chapter 3 Cyber and Crime -- 3.1 Cyber and Crime -- 3.1.1 Cybercrime Definitions -- 3.1.2 Crimes Against Individuals -- 3.1.2.1 Cyber-Fraud Reporting -- 3.1.2.2 Spam -- 3.1.2.3 Phishing -- 3.1.3 Crimes Against Organizations -- 3.1.3.1 Telephony Phishing -- 3.1.3.2 Ransomware Introduction -- 3.1.3.3 Ransomware Tools Background -- 3.1.3.4 Ransomware as a Service -- 3.1.3.5 Cryptocurrency , 3.1.4 Cyber Gangs -- Membership Analogy to Organized Crime -- 3.1.5 Cybercrime Wrap-Up -- Bibliography -- Chapter 4 Nation-State Cyber Operations -- 4.1 Nation State Cyber Operations -- 4.1.1 Advanced Persistent Threats -- 4.1.2 Nation-State Cyber Operations against Critical Infrastructure -- 4.1.3 Elements of a Nation-State Cyber Organization -- 4.1.3.1 Cyber Research Institutions -- 4.1.3.2 Cyber Engineering and Development -- 4.1.3.3 Cyber and Clandestine Services -- 4.1.4 Structure of Nation-State Cyber Operations and Maneuver -- 4.1.4.1 Cryptocurrencies, Sanctions, and Subversion , 4.1.5 Nation-State Cyber Operations Wrap-up -- Bibliography -- Chapter 5 Russian Cyber Operations -- 5.1 Russian Cyber Operations -- 5.1.1 Russian Policy, Tools, and Historical Use of Information Operations -- 5.1.1.1 Policy, Statecraft Tools, and Cryptocurrency -- 5.1.1.2 Information Operations, Developing Doctrine, and Russian Cyber Teams -- 5.1.1.3 Estonia Denial of Service Attack (2007) -- 5.1.2 Russian Information Operations -- 5.1.2.1 The Russian Federal Security Service (FSB) -- 5.1.2.2 Russia and Ukrainian Power System Attacks , 5.1.2.3 Foreign Intelligence Directorate (SVR)(APT 29 -- Nobelium)
    Additional Edition: Print version: Couretas, Jerry M. Cyber Operations Newark : John Wiley & Sons, Incorporated,c2024 ISBN 9781119712091
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Hoboken, New Jersey :John Wiley & Sons, Inc.,
    UID:
    almahu_9949747487502882
    Format: 1 online resource (323 p.)
    ISBN: 9781119712114 , 1119712114 , 9781119712121 , 1119712122 , 9781119712107 , 1119712106
    Content: Cyber Operations A rigorous new framework for understanding the world of the future Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an ever-expanding digital footprint. Cyber technologies like voice-activated search, automated transport, and the Internet of Things are only broadening the interface between the personal and the online, which creates new challenges and new opportunities. Improving both user security and quality of life demands a rigorous, farsighted approach to cyber operations. Cyber Operations offers a groundbreaking contribution to this effort, departing from earlier works to offer a comprehensive, structured framework for analyzing cyber systems and their interactions. Drawing on operational examples and real-world case studies, it promises to provide both cyber security professionals and cyber technologies designers with the conceptual models and practical methodologies they need to succeed. Cyber Operations readers will also find: Detailed discussions of case studies including the 2016 United States Presidential Election, the Dragonfly Campaign, and more Coverage of cyber attack impacts ranging from the psychological to attacks on physical infrastructure Insight from an author with top-level experience in cyber security Cyber Operations is ideal for all technological professionals or policymakers looking to develop their understanding of cyber issues.
    Note: Description based upon print version of record. , Cover -- Title Page -- Copyright Page -- Dedication Page -- Contents -- Section I Cyber Operations Introduction -- I.1 Phases of Cyber Operations -- I.1.1 1980s-2002 -- I.1.2 2003-2012 -- I.1.3 2013-present -- Chapter 1 Cyber Operations -- 1.1 Cyber Operations Introduction -- 1.1.1 Cyber -- A 21st-Century Collection Channel -- 1.1.2 Hackers -- Pre-Cyber Operations -- 1.1.3 Cyber and Counter-Terror/Insurgency -- 1.2 Early Internet and Cyber Operations -- 1.2.1 Maturing of Cyber Operations -- ISIS and Russia -- 1.2.2 ISIS Cyber Operations -- 1.2.3 Russian Cyber Operations , 1.3 Cyber Operations' Stage Descriptions -- 1.3.1 Stage I (late 1990s-~2010)(Community Development) -- 1.3.2 Stage II (~2010-~2015)(Tactical) -- 1.3.3 Stage III (~2015 to present)(Tactical and Strategic) -- 1.4 Cyber Operations Wrap-up -- Bibliography -- Chapter 2 ISIS and Web-Based Insurgency -- 2.1 Introduction -- 2.1.1 Terrorist Development of the Internet for Messaging -- 2.1.2 ISIS Adaptation of the Internet for Coordination, Command and Control (C2) -- 2.1.3 ISIS "Emergence" from Cyberspace to form a State -- 2.2 Cyber-Based Irregular Operations , 2.2.1 Three-Phase Insurgency Model with Cyber -- ISIS Example -- 2.2.2 ISIS Insurgency Phases -- 2.2.3 Counter-ISIS Operations in Cyber -- 2.3 ISIS and Web-Based Insurgency Wrap-up -- Bibliography -- Chapter 3 Cyber and Crime -- 3.1 Cyber and Crime -- 3.1.1 Cybercrime Definitions -- 3.1.2 Crimes Against Individuals -- 3.1.2.1 Cyber-Fraud Reporting -- 3.1.2.2 Spam -- 3.1.2.3 Phishing -- 3.1.3 Crimes Against Organizations -- 3.1.3.1 Telephony Phishing -- 3.1.3.2 Ransomware Introduction -- 3.1.3.3 Ransomware Tools Background -- 3.1.3.4 Ransomware as a Service -- 3.1.3.5 Cryptocurrency , 3.1.4 Cyber Gangs -- Membership Analogy to Organized Crime -- 3.1.5 Cybercrime Wrap-Up -- Bibliography -- Chapter 4 Nation-State Cyber Operations -- 4.1 Nation State Cyber Operations -- 4.1.1 Advanced Persistent Threats -- 4.1.2 Nation-State Cyber Operations against Critical Infrastructure -- 4.1.3 Elements of a Nation-State Cyber Organization -- 4.1.3.1 Cyber Research Institutions -- 4.1.3.2 Cyber Engineering and Development -- 4.1.3.3 Cyber and Clandestine Services -- 4.1.4 Structure of Nation-State Cyber Operations and Maneuver -- 4.1.4.1 Cryptocurrencies, Sanctions, and Subversion , 4.1.5 Nation-State Cyber Operations Wrap-up -- Bibliography -- Chapter 5 Russian Cyber Operations -- 5.1 Russian Cyber Operations -- 5.1.1 Russian Policy, Tools, and Historical Use of Information Operations -- 5.1.1.1 Policy, Statecraft Tools, and Cryptocurrency -- 5.1.1.2 Information Operations, Developing Doctrine, and Russian Cyber Teams -- 5.1.1.3 Estonia Denial of Service Attack (2007) -- 5.1.2 Russian Information Operations -- 5.1.2.1 The Russian Federal Security Service (FSB) -- 5.1.2.2 Russia and Ukrainian Power System Attacks , 5.1.2.3 Foreign Intelligence Directorate (SVR)(APT 29 -- Nobelium)
    Additional Edition: Print version: Couretas, Jerry M. Cyber Operations Newark : John Wiley & Sons, Incorporated,c2024 ISBN 9781119712091
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 1119312132?
Did you mean 111971012x?
Did you mean 1119711142?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages