The basics of cyber warfare :: understanding the fundamentals of cyber warfare in theory and practice /
As part of the Syngress Basics series, The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber warfare in both theoretical and practical aspects. This book explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The Ba...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified] :
Syngress,
2012.
|
Schriftenreihe: | Syngress basics series.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | As part of the Syngress Basics series, The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber warfare in both theoretical and practical aspects. This book explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The Basics of Cyber Warfare teaches readers the principles of cyber warfare, including military doctrine, cyber doctrine, and both offensive and defensive tactics and procedures. Readers learn the basics of how to defend against: . Espionage . Hactivism . Insider threats . State-sponsored attacks . Non-state actors such as organized criminals and terrorists The Basics of Cyber Warfare gives readers a concise overview of these threats, and outlines the ethics, laws and consequences of cyber war. This book is designed as an introductory book to give readers insight into the concepts and techniques of cyber warfare. The authors' other title, Cyber Warfare, published by Syngress in 2011, will be mentioned in the Introduction of this book for readers who are interested in diving in to these topics and techniques in more depth. Provides a sound understanding of the tools and tactics used in cyber warfare. Describes both offensive and defensive tactics from an insider's point of view. Presents doctrine and hands-on techniques you need to understand as cyber warfare evolves with technology. |
Beschreibung: | 1 online resource |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780124047372 0124047378 9780124051812 0124051812 1283810840 9781283810845 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn819636706 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 121129s2012 xx ob 001 0 eng d | ||
040 | |a OPELS |b eng |e pn |c OPELS |d OCLCF |d OCLCO |d UMI |d COO |d DEBSZ |d IDEBK |d STF |d B24X7 |d C6I |d E7B |d UIU |d TEFOD |d CDX |d N$T |d S4S |d YDXCP |d OCLCO |d TEFOD |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d LOA |d OCLCO |d ICA |d LVT |d AGLDB |d COCUF |d K6U |d CNNOR |d PIFAG |d FVL |d OCLCQ |d SAV |d OCLCQ |d U3W |d D6H |d OCLCQ |d VTS |d OCLCQ |d WYU |d LEAUB |d OL$ |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO | ||
019 | |a 822038679 |a 823729492 |a 842426544 |a 962188876 |a 972036824 |a 974756974 |a 974864515 |a 980909823 |a 981866606 |a 992094109 |a 1005938612 | ||
020 | |a 9780124047372 |q (electronic bk.) | ||
020 | |a 0124047378 |q (electronic bk.) | ||
020 | |a 9780124051812 | ||
020 | |a 0124051812 | ||
020 | |a 1283810840 | ||
020 | |a 9781283810845 | ||
035 | |a (OCoLC)819636706 |z (OCoLC)822038679 |z (OCoLC)823729492 |z (OCoLC)842426544 |z (OCoLC)962188876 |z (OCoLC)972036824 |z (OCoLC)974756974 |z (OCoLC)974864515 |z (OCoLC)980909823 |z (OCoLC)981866606 |z (OCoLC)992094109 |z (OCoLC)1005938612 | ||
037 | |a CL0500000215 |b Safari Books Online | ||
037 | |a 06E8B4F1-A57D-4EA5-994A-0DDDBC0AFDE9 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a TK5105.875.I57 |b W56 2012 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Winterfeld, Steve. |1 https://id.oclc.org/worldcat/entity/E39PCjGqGyBDydY9kbPwg36XFq |0 http://id.loc.gov/authorities/names/n2011030856 | |
245 | 1 | 4 | |a The basics of cyber warfare : |b understanding the fundamentals of cyber warfare in theory and practice / |c Steve Winterfield, Jason Andress. |
260 | |a [Place of publication not identified] : |b Syngress, |c 2012. | ||
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a The basics | |
520 | |a As part of the Syngress Basics series, The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber warfare in both theoretical and practical aspects. This book explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The Basics of Cyber Warfare teaches readers the principles of cyber warfare, including military doctrine, cyber doctrine, and both offensive and defensive tactics and procedures. Readers learn the basics of how to defend against: . Espionage . Hactivism . Insider threats . State-sponsored attacks . Non-state actors such as organized criminals and terrorists The Basics of Cyber Warfare gives readers a concise overview of these threats, and outlines the ethics, laws and consequences of cyber war. This book is designed as an introductory book to give readers insight into the concepts and techniques of cyber warfare. The authors' other title, Cyber Warfare, published by Syngress in 2011, will be mentioned in the Introduction of this book for readers who are interested in diving in to these topics and techniques in more depth. Provides a sound understanding of the tools and tactics used in cyber warfare. Describes both offensive and defensive tactics from an insider's point of view. Presents doctrine and hands-on techniques you need to understand as cyber warfare evolves with technology. | ||
588 | 0 | |a Publisher supplied information; title not viewed. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Cyber threatscape -- Cyberspace battlefield operations -- Cyber doctrine -- Tools and techniques -- Offensive tactics and procedures -- Psychological weapons -- Defensive tactics and procedures -- Challenges we face -- Where is cyber warfare headed? | |
650 | 0 | |a Internet |x Security measures. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 0 | |a Information warfare. |0 http://id.loc.gov/authorities/subjects/sh95005481 | |
650 | 6 | |a Internet |x Sécurité |x Mesures. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Guerre de l'information. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
700 | 1 | |a Andress, Jason. |1 https://id.oclc.org/worldcat/entity/E39PCjMvkvgGtxj4p6WKc9cgcd |0 http://id.loc.gov/authorities/names/no2010170578 | |
758 | |i has work: |a The basics of cyber warfare (Text) |1 https://id.oclc.org/worldcat/entity/E39PCH3vqYYHXFxprRM7V6THyd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Winterfeld, Steve. |t Basics of cyber warfare. |d Waltham, MA : Syngress, ©2013 |z 9780124047372 |w (DLC) 2012043184 |w (OCoLC)820450662 |
830 | 0 | |a Syngress basics series. |0 http://id.loc.gov/authorities/names/no2012061606 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780124047372 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=486630 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00051016 | ||
938 | |a Coutts Information Services |b COUT |n 24293691 | ||
938 | |a ebrary |b EBRY |n ebr10626273 | ||
938 | |a EBSCOhost |b EBSC |n 486630 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis24293691 | ||
938 | |a YBP Library Services |b YANK |n 9920700 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn819636706 |
---|---|
_version_ | 1816882215582171136 |
adam_text | |
any_adam_object | |
author | Winterfeld, Steve |
author2 | Andress, Jason |
author2_role | |
author2_variant | j a ja |
author_GND | http://id.loc.gov/authorities/names/n2011030856 http://id.loc.gov/authorities/names/no2010170578 |
author_facet | Winterfeld, Steve Andress, Jason |
author_role | |
author_sort | Winterfeld, Steve |
author_variant | s w sw |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.875.I57 W56 2012 |
callnumber-search | TK5105.875.I57 W56 2012 |
callnumber-sort | TK 45105.875 I57 W56 42012 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-4-EBA |
contents | Cyber threatscape -- Cyberspace battlefield operations -- Cyber doctrine -- Tools and techniques -- Offensive tactics and procedures -- Psychological weapons -- Defensive tactics and procedures -- Challenges we face -- Where is cyber warfare headed? |
ctrlnum | (OCoLC)819636706 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05670cam a2200757 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn819636706</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">121129s2012 xx ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">OPELS</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">OPELS</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">UMI</subfield><subfield code="d">COO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">STF</subfield><subfield code="d">B24X7</subfield><subfield code="d">C6I</subfield><subfield code="d">E7B</subfield><subfield code="d">UIU</subfield><subfield code="d">TEFOD</subfield><subfield code="d">CDX</subfield><subfield code="d">N$T</subfield><subfield code="d">S4S</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">LOA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">ICA</subfield><subfield code="d">LVT</subfield><subfield code="d">AGLDB</subfield><subfield code="d">COCUF</subfield><subfield code="d">K6U</subfield><subfield code="d">CNNOR</subfield><subfield code="d">PIFAG</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">LEAUB</subfield><subfield code="d">OL$</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">822038679</subfield><subfield code="a">823729492</subfield><subfield code="a">842426544</subfield><subfield code="a">962188876</subfield><subfield code="a">972036824</subfield><subfield code="a">974756974</subfield><subfield code="a">974864515</subfield><subfield code="a">980909823</subfield><subfield code="a">981866606</subfield><subfield code="a">992094109</subfield><subfield code="a">1005938612</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124047372</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124047378</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124051812</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124051812</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283810840</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283810845</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)819636706</subfield><subfield code="z">(OCoLC)822038679</subfield><subfield code="z">(OCoLC)823729492</subfield><subfield code="z">(OCoLC)842426544</subfield><subfield code="z">(OCoLC)962188876</subfield><subfield code="z">(OCoLC)972036824</subfield><subfield code="z">(OCoLC)974756974</subfield><subfield code="z">(OCoLC)974864515</subfield><subfield code="z">(OCoLC)980909823</subfield><subfield code="z">(OCoLC)981866606</subfield><subfield code="z">(OCoLC)992094109</subfield><subfield code="z">(OCoLC)1005938612</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000215</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">06E8B4F1-A57D-4EA5-994A-0DDDBC0AFDE9</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.875.I57</subfield><subfield code="b">W56 2012</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Winterfeld, Steve.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjGqGyBDydY9kbPwg36XFq</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2011030856</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The basics of cyber warfare :</subfield><subfield code="b">understanding the fundamentals of cyber warfare in theory and practice /</subfield><subfield code="c">Steve Winterfield, Jason Andress.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">[Place of publication not identified] :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">The basics</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">As part of the Syngress Basics series, The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber warfare in both theoretical and practical aspects. This book explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The Basics of Cyber Warfare teaches readers the principles of cyber warfare, including military doctrine, cyber doctrine, and both offensive and defensive tactics and procedures. Readers learn the basics of how to defend against: . Espionage . Hactivism . Insider threats . State-sponsored attacks . Non-state actors such as organized criminals and terrorists The Basics of Cyber Warfare gives readers a concise overview of these threats, and outlines the ethics, laws and consequences of cyber war. This book is designed as an introductory book to give readers insight into the concepts and techniques of cyber warfare. The authors' other title, Cyber Warfare, published by Syngress in 2011, will be mentioned in the Introduction of this book for readers who are interested in diving in to these topics and techniques in more depth. Provides a sound understanding of the tools and tactics used in cyber warfare. Describes both offensive and defensive tactics from an insider's point of view. Presents doctrine and hands-on techniques you need to understand as cyber warfare evolves with technology.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Publisher supplied information; title not viewed.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cyber threatscape -- Cyberspace battlefield operations -- Cyber doctrine -- Tools and techniques -- Offensive tactics and procedures -- Psychological weapons -- Defensive tactics and procedures -- Challenges we face -- Where is cyber warfare headed?</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh95005481</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Guerre de l'information.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Andress, Jason.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjMvkvgGtxj4p6WKc9cgcd</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2010170578</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The basics of cyber warfare (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCH3vqYYHXFxprRM7V6THyd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Winterfeld, Steve.</subfield><subfield code="t">Basics of cyber warfare.</subfield><subfield code="d">Waltham, MA : Syngress, ©2013</subfield><subfield code="z">9780124047372</subfield><subfield code="w">(DLC) 2012043184</subfield><subfield code="w">(OCoLC)820450662</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Syngress basics series.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2012061606</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780124047372</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=486630</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00051016</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">24293691</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10626273</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">486630</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis24293691</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">9920700</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn819636706 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:25:04Z |
institution | BVB |
isbn | 9780124047372 0124047378 9780124051812 0124051812 1283810840 9781283810845 |
language | English |
oclc_num | 819636706 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource |
psigel | ZDB-4-EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Syngress, |
record_format | marc |
series | Syngress basics series. |
series2 | The basics |
spelling | Winterfeld, Steve. https://id.oclc.org/worldcat/entity/E39PCjGqGyBDydY9kbPwg36XFq http://id.loc.gov/authorities/names/n2011030856 The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice / Steve Winterfield, Jason Andress. [Place of publication not identified] : Syngress, 2012. 1 online resource text txt rdacontent computer c rdamedia online resource cr rdacarrier data file The basics As part of the Syngress Basics series, The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber warfare in both theoretical and practical aspects. This book explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The Basics of Cyber Warfare teaches readers the principles of cyber warfare, including military doctrine, cyber doctrine, and both offensive and defensive tactics and procedures. Readers learn the basics of how to defend against: . Espionage . Hactivism . Insider threats . State-sponsored attacks . Non-state actors such as organized criminals and terrorists The Basics of Cyber Warfare gives readers a concise overview of these threats, and outlines the ethics, laws and consequences of cyber war. This book is designed as an introductory book to give readers insight into the concepts and techniques of cyber warfare. The authors' other title, Cyber Warfare, published by Syngress in 2011, will be mentioned in the Introduction of this book for readers who are interested in diving in to these topics and techniques in more depth. Provides a sound understanding of the tools and tactics used in cyber warfare. Describes both offensive and defensive tactics from an insider's point of view. Presents doctrine and hands-on techniques you need to understand as cyber warfare evolves with technology. Publisher supplied information; title not viewed. Includes bibliographical references and index. Cyber threatscape -- Cyberspace battlefield operations -- Cyber doctrine -- Tools and techniques -- Offensive tactics and procedures -- Psychological weapons -- Defensive tactics and procedures -- Challenges we face -- Where is cyber warfare headed? Internet Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Information warfare. http://id.loc.gov/authorities/subjects/sh95005481 Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Guerre de l'information. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Information warfare fast Internet Security measures fast Andress, Jason. https://id.oclc.org/worldcat/entity/E39PCjMvkvgGtxj4p6WKc9cgcd http://id.loc.gov/authorities/names/no2010170578 has work: The basics of cyber warfare (Text) https://id.oclc.org/worldcat/entity/E39PCH3vqYYHXFxprRM7V6THyd https://id.oclc.org/worldcat/ontology/hasWork Print version: Winterfeld, Steve. Basics of cyber warfare. Waltham, MA : Syngress, ©2013 9780124047372 (DLC) 2012043184 (OCoLC)820450662 Syngress basics series. http://id.loc.gov/authorities/names/no2012061606 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9780124047372 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=486630 Volltext |
spellingShingle | Winterfeld, Steve The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice / Syngress basics series. Cyber threatscape -- Cyberspace battlefield operations -- Cyber doctrine -- Tools and techniques -- Offensive tactics and procedures -- Psychological weapons -- Defensive tactics and procedures -- Challenges we face -- Where is cyber warfare headed? Internet Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Information warfare. http://id.loc.gov/authorities/subjects/sh95005481 Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Guerre de l'information. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Information warfare fast Internet Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 http://id.loc.gov/authorities/subjects/sh95005481 |
title | The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice / |
title_auth | The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice / |
title_exact_search | The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice / |
title_full | The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice / Steve Winterfield, Jason Andress. |
title_fullStr | The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice / Steve Winterfield, Jason Andress. |
title_full_unstemmed | The basics of cyber warfare : understanding the fundamentals of cyber warfare in theory and practice / Steve Winterfield, Jason Andress. |
title_short | The basics of cyber warfare : |
title_sort | basics of cyber warfare understanding the fundamentals of cyber warfare in theory and practice |
title_sub | understanding the fundamentals of cyber warfare in theory and practice / |
topic | Internet Security measures. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Information warfare. http://id.loc.gov/authorities/subjects/sh95005481 Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Guerre de l'information. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Information warfare fast Internet Security measures fast |
topic_facet | Internet Security measures. Computer networks Security measures. Information warfare. Internet Sécurité Mesures. Réseaux d'ordinateurs Sécurité Mesures. Guerre de l'information. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Information warfare Internet Security measures |
url | https://www.sciencedirect.com/science/book/9780124047372 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=486630 |
work_keys_str_mv | AT winterfeldsteve thebasicsofcyberwarfareunderstandingthefundamentalsofcyberwarfareintheoryandpractice AT andressjason thebasicsofcyberwarfareunderstandingthefundamentalsofcyberwarfareintheoryandpractice AT winterfeldsteve basicsofcyberwarfareunderstandingthefundamentalsofcyberwarfareintheoryandpractice AT andressjason basicsofcyberwarfareunderstandingthefundamentalsofcyberwarfareintheoryandpractice |