Introduction to Cyber-Warfare: A Multidisciplinary Approach
Autor Paulo Shakarian, Jana Shakarian, Andrew Ruefen Limba Engleză Paperback – 31 iul 2013
- Provides a multi-disciplinary approach to cyber-warfare, analyzing the information technology, military, policy, social, and scientific issues that are in play
- Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran)
- Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec
- Covers cyber-attacks directed against infrastructure, such as water treatment plants and power-grids, with a detailed account of Stuxent
Preț: 244.88 lei
Preț vechi: 277.15 lei
-12% Nou
Puncte Express: 367
Preț estimativ în valută:
46.86€ • 49.30$ • 38.90£
46.86€ • 49.30$ • 38.90£
Carte indisponibilă temporar
Doresc să fiu notificat când acest titlu va fi disponibil:
Se trimite...
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780124078147
ISBN-10: 0124078141
Pagini: 336
Ilustrații: black & white tables, figures
Dimensiuni: 191 x 235 x 18 mm
Greutate: 0.68 kg
Editura: ELSEVIER SCIENCE
ISBN-10: 0124078141
Pagini: 336
Ilustrații: black & white tables, figures
Dimensiuni: 191 x 235 x 18 mm
Greutate: 0.68 kg
Editura: ELSEVIER SCIENCE
Public țintă
Information security professionals, system administrators. Security managers, security analysts. defense analysts, defense personnel, U.S Cybercom staffCuprins
Chapter 1 Introduction
Part I: Cyber Attack
Chapter 2 – Cyber Attack in an Inter-State Conflict
Chapter 3 – Cyber Attack in Conjunction with Conventional Military Operations :
Chapter 4 – Cyber Attack in Support of Information Operations:
Chapter 5 – Cyber Attack Against Internal Dissidents
Chapter 6 – Cyber Attacks by Non-State Hacking Groups
Part II Cyber Espionage and Exploitation
Chapter 7 – Chinese Attributed Cyber Espionage
Chapter 8 – Hacking Unmanned Aerial Vehicles
Chapter 9 – Social Network Exploitation: Theory and Practice
Chapter 10 The Next Generation of Cyber Exploitation
Chapter 11 –Chapter 12 – Case Study
Part III
Chapter 11 – Industrial Control Systems
Chapter 12 – Cyber Attacks on the Power Grid
Chapter 13 – Stuxnet
Chapter 14- Conclusion and the Future of Cyber War
Part I: Cyber Attack
Chapter 2 – Cyber Attack in an Inter-State Conflict
Chapter 3 – Cyber Attack in Conjunction with Conventional Military Operations :
Chapter 4 – Cyber Attack in Support of Information Operations:
Chapter 5 – Cyber Attack Against Internal Dissidents
Chapter 6 – Cyber Attacks by Non-State Hacking Groups
Part II Cyber Espionage and Exploitation
Chapter 7 – Chinese Attributed Cyber Espionage
Chapter 8 – Hacking Unmanned Aerial Vehicles
Chapter 9 – Social Network Exploitation: Theory and Practice
Chapter 10 The Next Generation of Cyber Exploitation
Chapter 11 –Chapter 12 – Case Study
Part III
Chapter 11 – Industrial Control Systems
Chapter 12 – Cyber Attacks on the Power Grid
Chapter 13 – Stuxnet
Chapter 14- Conclusion and the Future of Cyber War
Recenzii
"...an excellent overview of the topic…It looks at the information security aspect of cyberwarfare, as well the military, sociological and other aspects…this book should indeed be read by everyone in Washington, as they are making decisions on the topic, without truly understanding it." --Slashdot.org, RSAConference.com, August 4 2014