Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners / Edition 2

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners / Edition 2

by Jason Andress, Steve Winterfeld
     
 

View All Available Formats & Editions

ISBN-10: 0124166725

ISBN-13: 9780124166721

Pub. Date: 10/30/2013

Publisher: Elsevier Science

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage,

Overview

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors—our defenses must be ready all the time and our alert systems must detect the threats every time.

  • Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
  • Dives deeply into relevant technical and factual information from an insider's point of view
  • Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result

Product Details

ISBN-13:
9780124166721
Publisher:
Elsevier Science
Publication date:
10/30/2013
Pages:
324
Sales rank:
274,597
Product dimensions:
7.60(w) x 9.30(h) x 0.40(d)

Table of Contents

Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline

Customer Reviews

Average Review:

Write a Review

and post it to your social network

     

Most Helpful Customer Reviews

See all customer reviews >