Autor: Shakarian, PauloShakarian, JanaRuef, Andrew
Wydawca: Elsevier
Dostępność: 3-6 tygodni
Cena: 239,40 zł
Przed złożeniem zamówienia prosimy o kontakt mailowy celem potwierdzenia ceny.
ISBN13: |
9780124078147 |
ISBN10: |
0124078141 |
Autor: |
Shakarian, PauloShakarian, JanaRuef, Andrew |
Oprawa: |
Paperback |
Rok Wydania: |
2013-08-01 |
Tematy: |
UR |
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.
Provides a multi-disciplinary approach to cyber-warfare, analyzing the information technology, military, policy, social, and scientific issues that are in playPresents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran)Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec Covers cyber-attacks directed against infrastructure, such as water treatment plants and power-grids, with a detailed account of Stuxent
Chapter 1 Introduction
Part I: Cyber Attack
Chapter 2 – Cyber Attack in an Inter-State Conflict
Chapter 3 – Cyber Attack in Conjunction with Conventional Military Operations :
Chapter 4 – Cyber Attack in Support of Information Operations:
Chapter 5 – Cyber Attack Against Internal Dissidents
Chapter 6 – Cyber Attacks by Non-State Hacking Groups
Part II Cyber Espionage and Exploitation
Chapter 7 – Chinese Attributed Cyber Espionage
Chapter 8 – Hacking Unmanned Aerial Vehicles
Chapter 9 – Social Network Exploitation: Theory and Practice
Chapter 10 The Next Generation of Cyber Exploitation
Chapter 11 –Chapter 12 – Case Study
Part III
Chapter 11 – Industrial Control Systems
Chapter 12 – Cyber Attacks on the Power Grid
Chapter 13 – Stuxnet
Chapter 14- Conclusion and the Future of Cyber War
Książek w koszyku: 0 szt.
Wartość zakupów: 0,00 zł
Gambit
Centrum Oprogramowania
i Szkoleń Sp. z o.o.
Al. Pokoju 29b/22-24
31-564 Kraków
Siedziba Księgarni
ul. Kordylewskiego 1
31-542 Kraków
+48 12 410 5991
+48 12 410 5987
+48 12 410 5989
Administratorem danych osobowych jest firma Gambit COiS Sp. z o.o. Na podany adres będzie wysyłany wyłącznie biuletyn informacyjny.
© Copyright 2012: GAMBIT COiS Sp. z o.o. Wszelkie prawa zastrzeżone.
Projekt i wykonanie: Alchemia Studio Reklamy