Cyber warfare: techniques, tactics and tools for security practitioners
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam [u.a.]
Elsevier/Syngress
2011
|
Schlagworte: | |
Online-Zugang: | FUBA1 Volltext |
Beschreibung: | Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the threats every time. Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks Dives deeply into relevant technical and factual information from an insider's point of view Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result Includes bibliographical references and index |
Beschreibung: | 1 Online-Ressource (XXVII, 289 S.) Ill. |
ISBN: | 9781597496384 1597496383 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042306952 | ||
003 | DE-604 | ||
005 | 20210823 | ||
007 | cr|uuu---uuuuu | ||
008 | 150129s2011 |||| o||u| ||||||eng d | ||
020 | |a 9781597496384 |c electronic bk. |9 978-1-59749-638-4 | ||
020 | |a 1597496383 |c electronic bk. |9 1-59749-638-3 | ||
024 | 7 | |a 10.1016/C2010-0-66971-9 |2 doi | |
035 | |a (OCoLC)733937342 | ||
035 | |a (DE-599)BVBBV042306952 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-188 | ||
082 | 0 | |a 355.3/43 |2 23 | |
084 | |a PZ 4800 |0 (DE-625)141183: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Andress, Jason |e Verfasser |0 (DE-588)101729996X |4 aut | |
245 | 1 | 0 | |a Cyber warfare |b techniques, tactics and tools for security practitioners |c Jason Andress, Steve Winterfeld |
264 | 1 | |a Amsterdam [u.a.] |b Elsevier/Syngress |c 2011 | |
300 | |a 1 Online-Ressource (XXVII, 289 S.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the threats every time. Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks Dives deeply into relevant technical and factual information from an insider's point of view Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result | ||
500 | |a Includes bibliographical references and index | ||
650 | 7 | |a Handbooks, manuals, etc |2 fast | |
650 | 7 | |a HISTORY / Military / Biological & Chemical Warfare |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
650 | 4 | |a Information warfare |v Handbooks, manuals, etc | |
650 | 4 | |a Computer networks |x Security measures |v Handbooks, manuals, etc | |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
655 | 7 | |8 1\p |0 (DE-588)4151278-9 |a Einführung |2 gnd-content | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |8 2\p |5 DE-604 | |
700 | 1 | |a Winterfeld, Steve |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-59749-637-7 |w (DE-604)BV039135632 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1-59749-637-5 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597496377 |x Verlag |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
940 | 1 | |q FAW_PDA_ESD | |
940 | 1 | |q FLA_PDA_ESD | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027743944 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597496377 |l FUBA1 |p ZDB-33-ESD |q ZDB-33-ESD 2012 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804152891722694656 |
---|---|
any_adam_object | |
author | Andress, Jason Winterfeld, Steve |
author_GND | (DE-588)101729996X |
author_facet | Andress, Jason Winterfeld, Steve |
author_role | aut aut |
author_sort | Andress, Jason |
author_variant | j a ja s w sw |
building | Verbundindex |
bvnumber | BV042306952 |
classification_rvk | PZ 4800 ST 277 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (OCoLC)733937342 (DE-599)BVBBV042306952 |
dewey-full | 355.3/43 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.3/43 |
dewey-search | 355.3/43 |
dewey-sort | 3355.3 243 |
dewey-tens | 350 - Public administration and military science |
discipline | Rechtswissenschaft Informatik Militärwissenschaft |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03355nmm a2200577zc 4500</leader><controlfield tag="001">BV042306952</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210823 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150129s2011 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597496384</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-638-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597496383</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-638-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1016/C2010-0-66971-9</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)733937342</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042306952</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-188</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.3/43</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">PZ 4800</subfield><subfield code="0">(DE-625)141183:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Andress, Jason</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)101729996X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber warfare</subfield><subfield code="b">techniques, tactics and tools for security practitioners</subfield><subfield code="c">Jason Andress, Steve Winterfeld</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Amsterdam [u.a.]</subfield><subfield code="b">Elsevier/Syngress</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXVII, 289 S.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the threats every time. Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks Dives deeply into relevant technical and factual information from an insider's point of view Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Handbooks, manuals, etc</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY / Military / Biological & Chemical Warfare</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="8">1\p</subfield><subfield code="0">(DE-588)4151278-9</subfield><subfield code="a">Einführung</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Winterfeld, Steve</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-59749-637-7</subfield><subfield code="w">(DE-604)BV039135632</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1-59749-637-5</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597496377</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FAW_PDA_ESD</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">FLA_PDA_ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027743944</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597496377</subfield><subfield code="l">FUBA1</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">ZDB-33-ESD 2012</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
genre | 1\p (DE-588)4151278-9 Einführung gnd-content |
genre_facet | Einführung |
id | DE-604.BV042306952 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:17:55Z |
institution | BVB |
isbn | 9781597496384 1597496383 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027743944 |
oclc_num | 733937342 |
open_access_boolean | |
owner | DE-1046 DE-188 |
owner_facet | DE-1046 DE-188 |
physical | 1 Online-Ressource (XXVII, 289 S.) Ill. |
psigel | ZDB-33-ESD ZDB-33-EBS FAW_PDA_ESD FLA_PDA_ESD ZDB-33-ESD ZDB-33-ESD 2012 |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Elsevier/Syngress |
record_format | marc |
spelling | Andress, Jason Verfasser (DE-588)101729996X aut Cyber warfare techniques, tactics and tools for security practitioners Jason Andress, Steve Winterfeld Amsterdam [u.a.] Elsevier/Syngress 2011 1 Online-Ressource (XXVII, 289 S.) Ill. txt rdacontent c rdamedia cr rdacarrier Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the threats every time. Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks Dives deeply into relevant technical and factual information from an insider's point of view Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result Includes bibliographical references and index Handbooks, manuals, etc fast HISTORY / Military / Biological & Chemical Warfare bisacsh Computer networks / Security measures fast Information warfare fast Information warfare Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Information warfare (DE-588)4461975-3 gnd rswk-swf 1\p (DE-588)4151278-9 Einführung gnd-content Information warfare (DE-588)4461975-3 s 2\p DE-604 Winterfeld, Steve Verfasser aut Erscheint auch als Druck-Ausgabe 978-1-59749-637-7 (DE-604)BV039135632 Erscheint auch als Druck-Ausgabe 1-59749-637-5 http://www.sciencedirect.com/science/book/9781597496377 Verlag Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Andress, Jason Winterfeld, Steve Cyber warfare techniques, tactics and tools for security practitioners Handbooks, manuals, etc fast HISTORY / Military / Biological & Chemical Warfare bisacsh Computer networks / Security measures fast Information warfare fast Information warfare Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4461975-3 (DE-588)4151278-9 |
title | Cyber warfare techniques, tactics and tools for security practitioners |
title_auth | Cyber warfare techniques, tactics and tools for security practitioners |
title_exact_search | Cyber warfare techniques, tactics and tools for security practitioners |
title_full | Cyber warfare techniques, tactics and tools for security practitioners Jason Andress, Steve Winterfeld |
title_fullStr | Cyber warfare techniques, tactics and tools for security practitioners Jason Andress, Steve Winterfeld |
title_full_unstemmed | Cyber warfare techniques, tactics and tools for security practitioners Jason Andress, Steve Winterfeld |
title_short | Cyber warfare |
title_sort | cyber warfare techniques tactics and tools for security practitioners |
title_sub | techniques, tactics and tools for security practitioners |
topic | Handbooks, manuals, etc fast HISTORY / Military / Biological & Chemical Warfare bisacsh Computer networks / Security measures fast Information warfare fast Information warfare Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Information warfare (DE-588)4461975-3 gnd |
topic_facet | Handbooks, manuals, etc HISTORY / Military / Biological & Chemical Warfare Computer networks / Security measures Information warfare Information warfare Handbooks, manuals, etc Computer networks Security measures Handbooks, manuals, etc Einführung |
url | http://www.sciencedirect.com/science/book/9781597496377 |
work_keys_str_mv | AT andressjason cyberwarfaretechniquestacticsandtoolsforsecuritypractitioners AT winterfeldsteve cyberwarfaretechniquestacticsandtoolsforsecuritypractitioners |