Cyber Warfare :: Techniques, Tactics and Tools for Security Practitioners /
This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Waltham, Massachusetts :
Syngress, an imprint of Elsevier,
2014.
|
Ausgabe: | Second edition. |
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. |
Beschreibung: | 1 online resource (325 pages) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780124166721 0124166725 9780124166332 0124166334 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn860710941 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 131014s2014 mau obf 001 0 eng d | ||
040 | |a N$T |b eng |e rda |e pn |c N$T |d UIU |d OPELS |d YDXCP |d UMI |d UPM |d B24X7 |d COO |d DEBBG |d GGVRL |d DEBSZ |d TXA |d NKT |d OCLCF |d EBLCP |d CDX |d TEFOD |d OCLCQ |d ICA |d CCO |d LOA |d OCLCQ |d COCUF |d AGLDB |d K6U |d CNNOR |d STF |d PIFAG |d FVL |d ZCU |d MERUC |d SAV |d OCLCQ |d U3W |d D6H |d VTS |d LND |d CEF |d ICG |d INT |d AU@ |d OCLCQ |d G3B |d TKN |d OCLCQ |d AUD |d DKC |d OCLCQ |d VT2 |d OCLCQ |d BRF |d EYM |d OCLCQ |d OCLCO |d QGK |d OCLCO |d OCLCQ |d OCLCO | ||
019 | |a 862048796 |a 863670200 |a 868597630 |a 900003371 |a 964651920 |a 966373430 |a 966386044 |a 1060195693 |a 1179553637 |a 1194863043 |a 1259218800 | ||
020 | |a 9780124166721 |q (electronic bk.) | ||
020 | |a 0124166725 |q (electronic bk.) | ||
020 | |a 9780124166332 |q (electronic bk.) | ||
020 | |a 0124166334 |q (electronic bk.) | ||
020 | |z 9780124166721 | ||
020 | |z 0124166725 | ||
020 | |z 9781299964655 | ||
020 | |z 1299964656 | ||
035 | |a (OCoLC)860710941 |z (OCoLC)862048796 |z (OCoLC)863670200 |z (OCoLC)868597630 |z (OCoLC)900003371 |z (OCoLC)964651920 |z (OCoLC)966373430 |z (OCoLC)966386044 |z (OCoLC)1060195693 |z (OCoLC)1179553637 |z (OCoLC)1194863043 |z (OCoLC)1259218800 | ||
037 | |a CL0500000362 |b Safari Books Online | ||
037 | |a 10E99E4B-8789-4F41-A6E6-E89DD39272BC |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a U163 |b .A64 2014eb | |
072 | 7 | |a HIS |x 027130 |2 bisacsh | |
072 | 7 | |a TEC |x 025000 |2 bisacsh | |
082 | 7 | |a 355.3/43 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Andress, Jason, |e author. |0 http://id.loc.gov/authorities/names/no2010170578 | |
245 | 1 | 0 | |a Cyber Warfare : |b Techniques, Tactics and Tools for Security Practitioners / |c Jason Andress, Steve Winterfeld. |
246 | 3 | |a Cyberwarfare, Techniques, Tactics and Tools for Security Practitioners | |
250 | |a Second edition. | ||
264 | 1 | |a Waltham, Massachusetts : |b Syngress, an imprint of Elsevier, |c 2014. | |
300 | |a 1 online resource (325 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a 1. What is cyber warfare? -- 2. Cyber threatscape -- 3. The cyberspace battlefield -- 4. Cyber doctrine -- 5. Cyber warriors -- 6. Logical weapons -- 7. Physical weapons -- 8. Psychological weapons -- 9. Computer network exploitation -- 10. Computer network attack -- 11. Computer network defense -- 12. Non-state actors in computer network operations -- 13. Legal system impacts -- 14. Ethics -- 15. Cyberspace challenges -- 16. The future of cyber war. | |
520 | |a This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. | ||
546 | |a English. | ||
650 | 0 | |a Information warfare |v Handbooks, manuals, etc. | |
650 | 0 | |a Computer networks |x Security measures |v Handbooks, manuals, etc. | |
650 | 6 | |a Guerre de l'information |v Guides, manuels, etc. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures |v Guides, manuels, etc. | |
650 | 7 | |a HISTORY |x Military |x Other. |2 bisacsh | |
650 | 7 | |a TECHNOLOGY & ENGINEERING |x Military Science. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Information warfare |2 fast | |
655 | 7 | |a handbooks. |2 aat | |
655 | 7 | |a manuals (instructional materials) |2 aat | |
655 | 7 | |a Handbooks and manuals |2 fast | |
655 | 7 | |a Handbooks and manuals. |2 lcgft |0 http://id.loc.gov/authorities/genreForms/gf2014026109 | |
655 | 7 | |a Guides et manuels. |2 rvmgf | |
700 | 1 | |a Winterfeld, Steve, |e author. |0 http://id.loc.gov/authorities/names/n2011030856 | |
776 | 0 | 8 | |i Print version: |a Andress, Jason. |t Cyber warfare. |b Second edition |z 9780124166721 |w (DLC) 2013034031 |w (OCoLC)857234371 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=558253 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780124166721 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00056535 | ||
938 | |a Coutts Information Services |b COUT |n 26307936 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1463416 | ||
938 | |a EBSCOhost |b EBSC |n 558253 | ||
938 | |a Cengage Learning |b GVRL |n GVRL8DVN | ||
938 | |a YBP Library Services |b YANK |n 11239160 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn860710941 |
---|---|
_version_ | 1816882247562690560 |
adam_text | |
any_adam_object | |
author | Andress, Jason Winterfeld, Steve |
author_GND | http://id.loc.gov/authorities/names/no2010170578 http://id.loc.gov/authorities/names/n2011030856 |
author_facet | Andress, Jason Winterfeld, Steve |
author_role | aut aut |
author_sort | Andress, Jason |
author_variant | j a ja s w sw |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | U - Military Science |
callnumber-label | U163 |
callnumber-raw | U163 .A64 2014eb |
callnumber-search | U163 .A64 2014eb |
callnumber-sort | U 3163 A64 42014EB |
callnumber-subject | U - General Military Science |
collection | ZDB-4-EBA |
contents | 1. What is cyber warfare? -- 2. Cyber threatscape -- 3. The cyberspace battlefield -- 4. Cyber doctrine -- 5. Cyber warriors -- 6. Logical weapons -- 7. Physical weapons -- 8. Psychological weapons -- 9. Computer network exploitation -- 10. Computer network attack -- 11. Computer network defense -- 12. Non-state actors in computer network operations -- 13. Legal system impacts -- 14. Ethics -- 15. Cyberspace challenges -- 16. The future of cyber war. |
ctrlnum | (OCoLC)860710941 |
dewey-full | 355.3/43 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.3/43 |
dewey-search | 355.3/43 |
dewey-sort | 3355.3 243 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04731cam a2200781 i 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn860710941</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">131014s2014 mau obf 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">UIU</subfield><subfield code="d">OPELS</subfield><subfield code="d">YDXCP</subfield><subfield code="d">UMI</subfield><subfield code="d">UPM</subfield><subfield code="d">B24X7</subfield><subfield code="d">COO</subfield><subfield code="d">DEBBG</subfield><subfield code="d">GGVRL</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">TXA</subfield><subfield code="d">NKT</subfield><subfield code="d">OCLCF</subfield><subfield code="d">EBLCP</subfield><subfield code="d">CDX</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ICA</subfield><subfield code="d">CCO</subfield><subfield code="d">LOA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COCUF</subfield><subfield code="d">AGLDB</subfield><subfield code="d">K6U</subfield><subfield code="d">CNNOR</subfield><subfield code="d">STF</subfield><subfield code="d">PIFAG</subfield><subfield code="d">FVL</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">SAV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">LND</subfield><subfield code="d">CEF</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">G3B</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AUD</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">BRF</subfield><subfield code="d">EYM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">862048796</subfield><subfield code="a">863670200</subfield><subfield code="a">868597630</subfield><subfield code="a">900003371</subfield><subfield code="a">964651920</subfield><subfield code="a">966373430</subfield><subfield code="a">966386044</subfield><subfield code="a">1060195693</subfield><subfield code="a">1179553637</subfield><subfield code="a">1194863043</subfield><subfield code="a">1259218800</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124166721</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124166725</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124166332</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124166334</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780124166721</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0124166725</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781299964655</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1299964656</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)860710941</subfield><subfield code="z">(OCoLC)862048796</subfield><subfield code="z">(OCoLC)863670200</subfield><subfield code="z">(OCoLC)868597630</subfield><subfield code="z">(OCoLC)900003371</subfield><subfield code="z">(OCoLC)964651920</subfield><subfield code="z">(OCoLC)966373430</subfield><subfield code="z">(OCoLC)966386044</subfield><subfield code="z">(OCoLC)1060195693</subfield><subfield code="z">(OCoLC)1179553637</subfield><subfield code="z">(OCoLC)1194863043</subfield><subfield code="z">(OCoLC)1259218800</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000362</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">10E99E4B-8789-4F41-A6E6-E89DD39272BC</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">U163</subfield><subfield code="b">.A64 2014eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HIS</subfield><subfield code="x">027130</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="x">025000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">355.3/43</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Andress, Jason,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2010170578</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Warfare :</subfield><subfield code="b">Techniques, Tactics and Tools for Security Practitioners /</subfield><subfield code="c">Jason Andress, Steve Winterfeld.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Cyberwarfare, Techniques, Tactics and Tools for Security Practitioners</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Massachusetts :</subfield><subfield code="b">Syngress, an imprint of Elsevier,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (325 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">1. What is cyber warfare? -- 2. Cyber threatscape -- 3. The cyberspace battlefield -- 4. Cyber doctrine -- 5. Cyber warriors -- 6. Logical weapons -- 7. Physical weapons -- 8. Psychological weapons -- 9. Computer network exploitation -- 10. Computer network attack -- 11. Computer network defense -- 12. Non-state actors in computer network operations -- 13. Legal system impacts -- 14. Ethics -- 15. Cyberspace challenges -- 16. The future of cyber war.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="v">Handbooks, manuals, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Guerre de l'information</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures</subfield><subfield code="v">Guides, manuels, etc.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">HISTORY</subfield><subfield code="x">Military</subfield><subfield code="x">Other.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">TECHNOLOGY & ENGINEERING</subfield><subfield code="x">Military Science.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Information warfare</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">handbooks.</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">manuals (instructional materials)</subfield><subfield code="2">aat</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Handbooks and manuals.</subfield><subfield code="2">lcgft</subfield><subfield code="0">http://id.loc.gov/authorities/genreForms/gf2014026109</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Guides et manuels.</subfield><subfield code="2">rvmgf</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Winterfeld, Steve,</subfield><subfield code="e">author.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2011030856</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Andress, Jason.</subfield><subfield code="t">Cyber warfare.</subfield><subfield code="b">Second edition</subfield><subfield code="z">9780124166721</subfield><subfield code="w">(DLC) 2013034031</subfield><subfield code="w">(OCoLC)857234371</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=558253</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780124166721</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00056535</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Coutts Information Services</subfield><subfield code="b">COUT</subfield><subfield code="n">26307936</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1463416</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">558253</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Cengage Learning</subfield><subfield code="b">GVRL</subfield><subfield code="n">GVRL8DVN</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">11239160</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | handbooks. aat manuals (instructional materials) aat Handbooks and manuals fast Handbooks and manuals. lcgft http://id.loc.gov/authorities/genreForms/gf2014026109 Guides et manuels. rvmgf |
genre_facet | handbooks. manuals (instructional materials) Handbooks and manuals Handbooks and manuals. Guides et manuels. |
id | ZDB-4-EBA-ocn860710941 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:25:34Z |
institution | BVB |
isbn | 9780124166721 0124166725 9780124166332 0124166334 |
language | English |
oclc_num | 860710941 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (325 pages) |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress, an imprint of Elsevier, |
record_format | marc |
spelling | Andress, Jason, author. http://id.loc.gov/authorities/names/no2010170578 Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners / Jason Andress, Steve Winterfeld. Cyberwarfare, Techniques, Tactics and Tools for Security Practitioners Second edition. Waltham, Massachusetts : Syngress, an imprint of Elsevier, 2014. 1 online resource (325 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Includes bibliographical references and index. Print version record. 1. What is cyber warfare? -- 2. Cyber threatscape -- 3. The cyberspace battlefield -- 4. Cyber doctrine -- 5. Cyber warriors -- 6. Logical weapons -- 7. Physical weapons -- 8. Psychological weapons -- 9. Computer network exploitation -- 10. Computer network attack -- 11. Computer network defense -- 12. Non-state actors in computer network operations -- 13. Legal system impacts -- 14. Ethics -- 15. Cyberspace challenges -- 16. The future of cyber war. This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. English. Information warfare Handbooks, manuals, etc. Computer networks Security measures Handbooks, manuals, etc. Guerre de l'information Guides, manuels, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. HISTORY Military Other. bisacsh TECHNOLOGY & ENGINEERING Military Science. bisacsh Computer networks Security measures fast Information warfare fast handbooks. aat manuals (instructional materials) aat Handbooks and manuals fast Handbooks and manuals. lcgft http://id.loc.gov/authorities/genreForms/gf2014026109 Guides et manuels. rvmgf Winterfeld, Steve, author. http://id.loc.gov/authorities/names/n2011030856 Print version: Andress, Jason. Cyber warfare. Second edition 9780124166721 (DLC) 2013034031 (OCoLC)857234371 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=558253 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9780124166721 Volltext |
spellingShingle | Andress, Jason Winterfeld, Steve Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners / 1. What is cyber warfare? -- 2. Cyber threatscape -- 3. The cyberspace battlefield -- 4. Cyber doctrine -- 5. Cyber warriors -- 6. Logical weapons -- 7. Physical weapons -- 8. Psychological weapons -- 9. Computer network exploitation -- 10. Computer network attack -- 11. Computer network defense -- 12. Non-state actors in computer network operations -- 13. Legal system impacts -- 14. Ethics -- 15. Cyberspace challenges -- 16. The future of cyber war. Information warfare Handbooks, manuals, etc. Computer networks Security measures Handbooks, manuals, etc. Guerre de l'information Guides, manuels, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. HISTORY Military Other. bisacsh TECHNOLOGY & ENGINEERING Military Science. bisacsh Computer networks Security measures fast Information warfare fast |
subject_GND | http://id.loc.gov/authorities/genreForms/gf2014026109 |
title | Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners / |
title_alt | Cyberwarfare, Techniques, Tactics and Tools for Security Practitioners |
title_auth | Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners / |
title_exact_search | Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners / |
title_full | Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners / Jason Andress, Steve Winterfeld. |
title_fullStr | Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners / Jason Andress, Steve Winterfeld. |
title_full_unstemmed | Cyber Warfare : Techniques, Tactics and Tools for Security Practitioners / Jason Andress, Steve Winterfeld. |
title_short | Cyber Warfare : |
title_sort | cyber warfare techniques tactics and tools for security practitioners |
title_sub | Techniques, Tactics and Tools for Security Practitioners / |
topic | Information warfare Handbooks, manuals, etc. Computer networks Security measures Handbooks, manuals, etc. Guerre de l'information Guides, manuels, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. HISTORY Military Other. bisacsh TECHNOLOGY & ENGINEERING Military Science. bisacsh Computer networks Security measures fast Information warfare fast |
topic_facet | Information warfare Handbooks, manuals, etc. Computer networks Security measures Handbooks, manuals, etc. Guerre de l'information Guides, manuels, etc. Réseaux d'ordinateurs Sécurité Mesures Guides, manuels, etc. HISTORY Military Other. TECHNOLOGY & ENGINEERING Military Science. Computer networks Security measures Information warfare handbooks. manuals (instructional materials) Handbooks and manuals Handbooks and manuals. Guides et manuels. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=558253 https://www.sciencedirect.com/science/book/9780124166721 |
work_keys_str_mv | AT andressjason cyberwarfaretechniquestacticsandtoolsforsecuritypractitioners AT winterfeldsteve cyberwarfaretechniquestacticsandtoolsforsecuritypractitioners |