Cyber Warfare
โ Scribed by Andress, Jason;Winterfeld, Steve
- Publisher
- Syngress
- Year
- 2013
- Tongue
- English
- Leaves
- 325
- Edition
- 2nd edition
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts. Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks Dives deeply into relevant technical and factual information from an insider's point of view Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result.
โฆ Subjects
Computer networks--Security measures;Computer security--Management;Data protection;Information technology--Security measures;Electronic books;Information technology -- Security measures;Computer security -- Management;Computer networks -- Security measures
๐ SIMILAR VOLUMES
This book provides an up-to-date, accessible guide to the growing threats in cyberspace that affects everyone from private individuals to businesses to national governments.;Cover; Title Page; Copyright Page; Dedication Page; Table of Contents; Acknowledgments; Chapter 1: The Transformation of Cyber