Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts. - Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks - Dives deeply into relevant technical and factual information from an insider's point of view - Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result
1119329326
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts. - Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks - Dives deeply into relevant technical and factual information from an insider's point of view - Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result
39.95 In Stock
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

eBook

$39.95 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts. - Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks - Dives deeply into relevant technical and factual information from an insider's point of view - Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result

Product Details

ISBN-13: 9780124166332
Publisher: Syngress Publishing
Publication date: 10/01/2013
Sold by: Barnes & Noble
Format: eBook
Pages: 324
File size: 3 MB

About the Author

Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.

Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity, Military Intelligence, Certification & Accreditation (C&A), Simulations and Project Management.

Table of Contents

ForewordIntroductionChapter 1. What is Cyber Warfare?Chapter 2. The Cyberspace BattlefieldChapter 3. Cyber DoctrineChapter 4. Cyber WarriorsChapter 5. Logical WeaponsChapter 6. Physical WeaponsChapter 7. Psychological WeaponsChapter 8. Computer Network ExploitationChapter 9. Computer Network AttackChapter 10. Computer Network DefenseChapter 11. Non-State Actors in Computer Network OperationsChapter 12. Legal System ImpactsChapter 13. EthicsChapter 14. Cyberspace ChallengesChapter 15. The Future of Cyber WarAppendix: Cyber Timeline

What People are Saying About This

From the Publisher

Cyber Warfare provides a comprehensive look at how and why digital warfare is waged!

From the B&N Reads Blog

Customer Reviews