The art of cyberwarfare: an investigator's guide to espionage, ransomware, and organized cybercrime
"This book is a guide to understanding the players in today's cyber wars, the techniques they use, and the process of analyzing their attacks. It provides an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations and informs how defenders can tra...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
San Francisco
No Starch Press
[2022]
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Zusammenfassung: | "This book is a guide to understanding the players in today's cyber wars, the techniques they use, and the process of analyzing their attacks. It provides an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations and informs how defenders can track and attribute future attacks"-- |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | xviii, 254 Seiten Illustrationen, Diagramme, Karte |
ISBN: | 9781718502147 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV048486216 | ||
003 | DE-604 | ||
005 | 20221128 | ||
007 | t | ||
008 | 220926s2022 a||| |||| 00||| eng d | ||
010 | |a 2021049772 | ||
020 | |a 9781718502147 |c paperback |9 978-1-7185-0214-7 | ||
035 | |a (OCoLC)1349541524 | ||
035 | |a (DE-599)KXP1776563360 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-522 |a DE-706 | ||
082 | 0 | |a a005.8 | |
100 | 1 | |a DiMaggio, Jon |e Verfasser |0 (DE-588)1269503014 |4 aut | |
245 | 1 | 0 | |a The art of cyberwarfare |b an investigator's guide to espionage, ransomware, and organized cybercrime |c by Jon DiMaggio |
264 | 1 | |a San Francisco |b No Starch Press |c [2022] | |
264 | 4 | |c © 2022 | |
300 | |a xviii, 254 Seiten |b Illustrationen, Diagramme, Karte | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a "This book is a guide to understanding the players in today's cyber wars, the techniques they use, and the process of analyzing their attacks. It provides an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations and informs how defenders can track and attribute future attacks"-- | ||
650 | 4 | |a Cyber intelligence (Computer security) | |
650 | 4 | |a Cyberterrorism |x Prevention | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Cyberspace operations (Military science) | |
650 | 0 | 7 | |a Prävention |0 (DE-588)4076308-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Cyberattacke |0 (DE-588)1075612675 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computerkriminalität |0 (DE-588)4010452-7 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Cyberattacke |0 (DE-588)1075612675 |D s |
689 | 1 | 1 | |a Prävention |0 (DE-588)4076308-0 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Computerkriminalität |0 (DE-588)4010452-7 |D s |
689 | 2 | 1 | |a Prävention |0 (DE-588)4076308-0 |D s |
689 | 2 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-1-7185-0215-4 |
856 | 4 | 2 | |u https://www.gbv.de/dms/bowker/toc/9781718502147.pdf |v 2022-07-28 |x Aggregator |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-033863782 |
Datensatz im Suchindex
_version_ | 1804184443724759040 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | DiMaggio, Jon |
author_GND | (DE-588)1269503014 |
author_facet | DiMaggio, Jon |
author_role | aut |
author_sort | DiMaggio, Jon |
author_variant | j d jd |
building | Verbundindex |
bvnumber | BV048486216 |
ctrlnum | (OCoLC)1349541524 (DE-599)KXP1776563360 |
dewey-raw | a005.8 |
dewey-search | a005.8 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02316nam a2200529 c 4500</leader><controlfield tag="001">BV048486216</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221128 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">220926s2022 a||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2021049772</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781718502147</subfield><subfield code="c">paperback</subfield><subfield code="9">978-1-7185-0214-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1349541524</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KXP1776563360</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">a005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">DiMaggio, Jon</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1269503014</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The art of cyberwarfare</subfield><subfield code="b">an investigator's guide to espionage, ransomware, and organized cybercrime</subfield><subfield code="c">by Jon DiMaggio</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">[2022]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2022</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xviii, 254 Seiten</subfield><subfield code="b">Illustrationen, Diagramme, Karte</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book is a guide to understanding the players in today's cyber wars, the techniques they use, and the process of analyzing their attacks. It provides an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations and informs how defenders can track and attribute future attacks"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyber intelligence (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberterrorism</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cyberspace operations (Military science)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Cyberattacke</subfield><subfield code="0">(DE-588)1075612675</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Computerkriminalität</subfield><subfield code="0">(DE-588)4010452-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Prävention</subfield><subfield code="0">(DE-588)4076308-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-1-7185-0215-4</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://www.gbv.de/dms/bowker/toc/9781718502147.pdf</subfield><subfield code="v">2022-07-28</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033863782</subfield></datafield></record></collection> |
id | DE-604.BV048486216 |
illustrated | Illustrated |
index_date | 2024-07-03T20:40:20Z |
indexdate | 2024-07-10T09:39:26Z |
institution | BVB |
isbn | 9781718502147 |
language | English |
lccn | 2021049772 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033863782 |
oclc_num | 1349541524 |
open_access_boolean | |
owner | DE-522 DE-706 |
owner_facet | DE-522 DE-706 |
physical | xviii, 254 Seiten Illustrationen, Diagramme, Karte |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | No Starch Press |
record_format | marc |
spelling | DiMaggio, Jon Verfasser (DE-588)1269503014 aut The art of cyberwarfare an investigator's guide to espionage, ransomware, and organized cybercrime by Jon DiMaggio San Francisco No Starch Press [2022] © 2022 xviii, 254 Seiten Illustrationen, Diagramme, Karte txt rdacontent n rdamedia nc rdacarrier Includes bibliographical references and index "This book is a guide to understanding the players in today's cyber wars, the techniques they use, and the process of analyzing their attacks. It provides an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations and informs how defenders can track and attribute future attacks"-- Cyber intelligence (Computer security) Cyberterrorism Prevention Computer crimes Prevention Cyberspace operations (Military science) Prävention (DE-588)4076308-0 gnd rswk-swf Cyberattacke (DE-588)1075612675 gnd rswk-swf Computerkriminalität (DE-588)4010452-7 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Information warfare (DE-588)4461975-3 s DE-604 Cyberattacke (DE-588)1075612675 s Prävention (DE-588)4076308-0 s Computerkriminalität (DE-588)4010452-7 s Erscheint auch als Online-Ausgabe 978-1-7185-0215-4 https://www.gbv.de/dms/bowker/toc/9781718502147.pdf 2022-07-28 Aggregator Inhaltsverzeichnis |
spellingShingle | DiMaggio, Jon The art of cyberwarfare an investigator's guide to espionage, ransomware, and organized cybercrime Cyber intelligence (Computer security) Cyberterrorism Prevention Computer crimes Prevention Cyberspace operations (Military science) Prävention (DE-588)4076308-0 gnd Cyberattacke (DE-588)1075612675 gnd Computerkriminalität (DE-588)4010452-7 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4076308-0 (DE-588)1075612675 (DE-588)4010452-7 (DE-588)4461975-3 |
title | The art of cyberwarfare an investigator's guide to espionage, ransomware, and organized cybercrime |
title_auth | The art of cyberwarfare an investigator's guide to espionage, ransomware, and organized cybercrime |
title_exact_search | The art of cyberwarfare an investigator's guide to espionage, ransomware, and organized cybercrime |
title_exact_search_txtP | The art of cyberwarfare an investigator's guide to espionage, ransomware, and organized cybercrime |
title_full | The art of cyberwarfare an investigator's guide to espionage, ransomware, and organized cybercrime by Jon DiMaggio |
title_fullStr | The art of cyberwarfare an investigator's guide to espionage, ransomware, and organized cybercrime by Jon DiMaggio |
title_full_unstemmed | The art of cyberwarfare an investigator's guide to espionage, ransomware, and organized cybercrime by Jon DiMaggio |
title_short | The art of cyberwarfare |
title_sort | the art of cyberwarfare an investigator s guide to espionage ransomware and organized cybercrime |
title_sub | an investigator's guide to espionage, ransomware, and organized cybercrime |
topic | Cyber intelligence (Computer security) Cyberterrorism Prevention Computer crimes Prevention Cyberspace operations (Military science) Prävention (DE-588)4076308-0 gnd Cyberattacke (DE-588)1075612675 gnd Computerkriminalität (DE-588)4010452-7 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | Cyber intelligence (Computer security) Cyberterrorism Prevention Computer crimes Prevention Cyberspace operations (Military science) Prävention Cyberattacke Computerkriminalität Information warfare |
url | https://www.gbv.de/dms/bowker/toc/9781718502147.pdf |
work_keys_str_mv | AT dimaggiojon theartofcyberwarfareaninvestigatorsguidetoespionageransomwareandorganizedcybercrime |