Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_9948093715502882
    Format: 1 online resource (321 p.)
    Edition: 1st edition
    ISBN: 1-283-11878-5 , 9786613118783 , 1-59749-638-3
    Content: Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the
    Note: Description based upon print version of record. , Front Cover; Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners; Copyright Page; Acknowledgments; Table of Contents; About the Authors; About the Technical Editor; Foreword; Introduction; Chapter1. What is Cyber Warfare?; What is Cyber Warfare?; Have We Seen a Cyber War?; Why Cyber Warfare is Important; Summary; Endnotes; Chapter2. The Cyberspace Battlefield; Boundaries in Cyber Warfare; Where Cyber Fits in the War-fighting Domains; Threatscape; Fielding Systems at the Speed of Need; Summary; Endnotes; Chapter3. Cyber Doctrine; Current U.S. Doctrine , Sample Doctrine/Strategy from Around the WorldTranslating Traditional Military Doctrine; Guidance and Directives; Operations and Exercises; Summary; Endnotes; Chapter4. Cyber Warriors; What Does a Cyber Warrior Look Like?; Differences from Traditional Forces; Present Cyber Warfare Forces; Staffing for Cyber War; Summary; Endnotes; Chapter5. Logical Weapons; Reconnaissance Tools; Scanning Tools; Access and Escalation Tools; Exfiltration Tools; Sustainment Tools; Assault Tools; Obfuscation Tools; Summary; Endnotes; Chapter6. Physical Weapons; How the Logical and Physical Realms are Connected , Infrastructure ConcernsSupply Chain Concerns; Tools for Physical Attack and Defense; Summary; Endnotes; Chapter7. Psychological Weapons; Social Engineering Explained; How the Military Approaches Social Engineering; How the Military Defends Against Social Engineering; Summary; Endnotes; Chapter8. Computer Network Exploitation; Intelligence and Counter-Intelligence; Reconnaissance; Surveillance; Summary; Endnotes; Chapter9. Computer Network Attack; Waging War in the Cyber Era; The Attack Process; Summary; Endnotes; Chapter10. Computer Network Defense; What We Protect , Security Awareness and TrainingDefending against Cyber Attacks; Summary; Endnotes; Chapter11. Non-State Actors in Computer Network Operations; Individual Actors; Corporations; Cyber Terrorism; Organized Cyber Crime; Autonomous Actors; Summary; Endnotes; Chapter12. Legal System Impacts; Legal Systems; Key U.S. Laws; Privacy Impacts; Digital Forensics; Summary; Endnotes; Chapter13. Ethics; Ethics in Cyber Warfare; Bellum Iustum (Just War Theory); Summary; Endnotes; Chapter14. Cyberspace Challenges; Cybersecurity Issues Defined; Interrelationship of Cybersecurity Issues; Way Ahead; Summary , EndnotesChapter15. The Future of Cyber War; Near Term Trends; Most Likely and Most Dangerous Courses of Action; New Technologies and New problems; International Interactions; Summary; Endnotes; Appendix: Cyber Timeline; Index
    Additional Edition: ISBN 1-59749-637-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages