The Art of Cyber Security :: A Practical Guide to Winning the War on Cyber Crime.
This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Ely :
IT Governance Ltd,
2022.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War. |
Beschreibung: | 1 online resource (184 pages) |
ISBN: | 9781787783669 1787783669 9781787783683 1787783685 |
Internformat
MARC
LEADER | 00000cam a2200000Mi 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1329050245 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu|||||||| | ||
008 | 220530s2022 xx o ||| 0 eng d | ||
040 | |a RBN |b eng |e rda |e pn |c RBN |d N$T |d OCLCF |d OCLCQ |d OCLCO |d TMA |d OCLCQ |d QGK | ||
020 | |a 9781787783669 |q (electronic bk.) | ||
020 | |a 1787783669 | ||
020 | |a 9781787783683 |q (electronic bk.) | ||
020 | |a 1787783685 |q (electronic bk.) | ||
020 | |z 9781787783652 | ||
035 | |a (OCoLC)1329050245 | ||
050 | 4 | |a QA76.9.A25 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Hibberd, Gary. | |
245 | 1 | 4 | |a The Art of Cyber Security : |b A Practical Guide to Winning the War on Cyber Crime. |
264 | 1 | |a Ely : |b IT Governance Ltd, |c 2022. | |
264 | 4 | |c ©2022. | |
300 | |a 1 online resource (184 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
505 | 0 | |a Cover -- Title -- Copyright -- About The Author -- Acknowledgements -- Foreword -- Preface -- Contents -- Part 1: The mindset of an artist -- Chapter 1: Introduction -- Security and privacy in a historical context -- Chapter 2: Definitions and clarifications -- Cyber -- Cyber crime -- Cyber security -- Information security -- Chapter 3: Cyber security as an art form -- The artist, the creator -- Education kills creativity -- How you see the world -- But what if what we do isn't perfect? -- In the flow -- You're not just an artist. You are a martial artist. -- Conclusion -- Part 2: Sun Tzu's The Art of War through the lens of cyber security -- Chapter 4: The art of cyber security -- Introduction -- Who was Sun Tzu? -- Translations -- A new kind of warfare -- The need for cyber security is unquestionable -- Let battle commence -- Chapter 5: Warfare and deception -- Chapter 6: Know yourself -- Understanding risk -- Chapter 7: Preparation and evasion -- Chapter 8: Water retains no constant shape -- Chapter 9: Strategy and tactics -- Chapter 10: The vital importance of state -- Chapter 11: The moral law -- Start with why -- Chapter 12: Calculations in battle -- Chapter 13: Rewards of war -- The blame game -- Rousing the C-suite to action -- Chapter 14: Good fighters -- Chapter 15: Signs and signals -- Chapter 16: The general and the sovereign -- Chapter 17: The clever general -- Decision fatigue -- The human condition -- Chapter 18: Disciplined and calm -- The survival arc -- Denial -- Deliberation -- Decisive action -- Chapter 19: Five dangerous faults -- Recklessness, leading to destruction -- Cowardice, which leads to capture -- A hasty temper, which can be provoked by insults -- A delicacy of honour which is sensitive to shame -- Over-solicitude for his men -- Chapter 20: Soldiers -- Chapter 21: Striving for victory -- Chapter 22: Conclusion. | |
505 | 8 | |a Chapter 23: Required reading -- Further reading. | |
520 | |a This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War. | ||
588 | |a Description based on publisher supplied metadata and other sources. | ||
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Computer networks |x Access control. |0 http://id.loc.gov/authorities/subjects/sh2007008424 | |
650 | 0 | |a Internet |x Security measures. | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Internet |x Sécurité |x Mesures. | |
650 | 7 | |a Computer networks |x Access control |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Internet |x Security measures |2 fast | |
653 | |a Mathematics | ||
776 | 0 | 8 | |i Print version: |a Hibberd, Gary |t The Art of Cyber Security |d Ely : IT Governance Ltd,c2022 |z 9781787783652 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3271935 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 3271935 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1329050245 |
---|---|
_version_ | 1816882561862860800 |
adam_text | |
any_adam_object | |
author | Hibberd, Gary |
author_facet | Hibberd, Gary |
author_role | |
author_sort | Hibberd, Gary |
author_variant | g h gh |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover -- Title -- Copyright -- About The Author -- Acknowledgements -- Foreword -- Preface -- Contents -- Part 1: The mindset of an artist -- Chapter 1: Introduction -- Security and privacy in a historical context -- Chapter 2: Definitions and clarifications -- Cyber -- Cyber crime -- Cyber security -- Information security -- Chapter 3: Cyber security as an art form -- The artist, the creator -- Education kills creativity -- How you see the world -- But what if what we do isn't perfect? -- In the flow -- You're not just an artist. You are a martial artist. -- Conclusion -- Part 2: Sun Tzu's The Art of War through the lens of cyber security -- Chapter 4: The art of cyber security -- Introduction -- Who was Sun Tzu? -- Translations -- A new kind of warfare -- The need for cyber security is unquestionable -- Let battle commence -- Chapter 5: Warfare and deception -- Chapter 6: Know yourself -- Understanding risk -- Chapter 7: Preparation and evasion -- Chapter 8: Water retains no constant shape -- Chapter 9: Strategy and tactics -- Chapter 10: The vital importance of state -- Chapter 11: The moral law -- Start with why -- Chapter 12: Calculations in battle -- Chapter 13: Rewards of war -- The blame game -- Rousing the C-suite to action -- Chapter 14: Good fighters -- Chapter 15: Signs and signals -- Chapter 16: The general and the sovereign -- Chapter 17: The clever general -- Decision fatigue -- The human condition -- Chapter 18: Disciplined and calm -- The survival arc -- Denial -- Deliberation -- Decisive action -- Chapter 19: Five dangerous faults -- Recklessness, leading to destruction -- Cowardice, which leads to capture -- A hasty temper, which can be provoked by insults -- A delicacy of honour which is sensitive to shame -- Over-solicitude for his men -- Chapter 20: Soldiers -- Chapter 21: Striving for victory -- Chapter 22: Conclusion. Chapter 23: Required reading -- Further reading. |
ctrlnum | (OCoLC)1329050245 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04070cam a2200517Mi 4500</leader><controlfield tag="001">ZDB-4-EBA-on1329050245</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">220530s2022 xx o ||| 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">RBN</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">RBN</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">QGK</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781787783669</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1787783669</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781787783683</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1787783685</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781787783652</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1329050245</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Hibberd, Gary.</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The Art of Cyber Security :</subfield><subfield code="b">A Practical Guide to Winning the War on Cyber Crime.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Ely :</subfield><subfield code="b">IT Governance Ltd,</subfield><subfield code="c">2022.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2022.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (184 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Title -- Copyright -- About The Author -- Acknowledgements -- Foreword -- Preface -- Contents -- Part 1: The mindset of an artist -- Chapter 1: Introduction -- Security and privacy in a historical context -- Chapter 2: Definitions and clarifications -- Cyber -- Cyber crime -- Cyber security -- Information security -- Chapter 3: Cyber security as an art form -- The artist, the creator -- Education kills creativity -- How you see the world -- But what if what we do isn't perfect? -- In the flow -- You're not just an artist. You are a martial artist. -- Conclusion -- Part 2: Sun Tzu's The Art of War through the lens of cyber security -- Chapter 4: The art of cyber security -- Introduction -- Who was Sun Tzu? -- Translations -- A new kind of warfare -- The need for cyber security is unquestionable -- Let battle commence -- Chapter 5: Warfare and deception -- Chapter 6: Know yourself -- Understanding risk -- Chapter 7: Preparation and evasion -- Chapter 8: Water retains no constant shape -- Chapter 9: Strategy and tactics -- Chapter 10: The vital importance of state -- Chapter 11: The moral law -- Start with why -- Chapter 12: Calculations in battle -- Chapter 13: Rewards of war -- The blame game -- Rousing the C-suite to action -- Chapter 14: Good fighters -- Chapter 15: Signs and signals -- Chapter 16: The general and the sovereign -- Chapter 17: The clever general -- Decision fatigue -- The human condition -- Chapter 18: Disciplined and calm -- The survival arc -- Denial -- Deliberation -- Decisive action -- Chapter 19: Five dangerous faults -- Recklessness, leading to destruction -- Cowardice, which leads to capture -- A hasty temper, which can be provoked by insults -- A delicacy of honour which is sensitive to shame -- Over-solicitude for his men -- Chapter 20: Soldiers -- Chapter 21: Striving for victory -- Chapter 22: Conclusion.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Chapter 23: Required reading -- Further reading.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2007008424</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Internet</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Internet</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Internet</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Mathematics</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Hibberd, Gary</subfield><subfield code="t">The Art of Cyber Security</subfield><subfield code="d">Ely : IT Governance Ltd,c2022</subfield><subfield code="z">9781787783652</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3271935</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">3271935</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1329050245 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:30:35Z |
institution | BVB |
isbn | 9781787783669 1787783669 9781787783683 1787783685 |
language | English |
oclc_num | 1329050245 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (184 pages) |
psigel | ZDB-4-EBA |
publishDate | 2022 |
publishDateSearch | 2022 |
publishDateSort | 2022 |
publisher | IT Governance Ltd, |
record_format | marc |
spelling | Hibberd, Gary. The Art of Cyber Security : A Practical Guide to Winning the War on Cyber Crime. Ely : IT Governance Ltd, 2022. ©2022. 1 online resource (184 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Cover -- Title -- Copyright -- About The Author -- Acknowledgements -- Foreword -- Preface -- Contents -- Part 1: The mindset of an artist -- Chapter 1: Introduction -- Security and privacy in a historical context -- Chapter 2: Definitions and clarifications -- Cyber -- Cyber crime -- Cyber security -- Information security -- Chapter 3: Cyber security as an art form -- The artist, the creator -- Education kills creativity -- How you see the world -- But what if what we do isn't perfect? -- In the flow -- You're not just an artist. You are a martial artist. -- Conclusion -- Part 2: Sun Tzu's The Art of War through the lens of cyber security -- Chapter 4: The art of cyber security -- Introduction -- Who was Sun Tzu? -- Translations -- A new kind of warfare -- The need for cyber security is unquestionable -- Let battle commence -- Chapter 5: Warfare and deception -- Chapter 6: Know yourself -- Understanding risk -- Chapter 7: Preparation and evasion -- Chapter 8: Water retains no constant shape -- Chapter 9: Strategy and tactics -- Chapter 10: The vital importance of state -- Chapter 11: The moral law -- Start with why -- Chapter 12: Calculations in battle -- Chapter 13: Rewards of war -- The blame game -- Rousing the C-suite to action -- Chapter 14: Good fighters -- Chapter 15: Signs and signals -- Chapter 16: The general and the sovereign -- Chapter 17: The clever general -- Decision fatigue -- The human condition -- Chapter 18: Disciplined and calm -- The survival arc -- Denial -- Deliberation -- Decisive action -- Chapter 19: Five dangerous faults -- Recklessness, leading to destruction -- Cowardice, which leads to capture -- A hasty temper, which can be provoked by insults -- A delicacy of honour which is sensitive to shame -- Over-solicitude for his men -- Chapter 20: Soldiers -- Chapter 21: Striving for victory -- Chapter 22: Conclusion. Chapter 23: Required reading -- Further reading. This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War. Description based on publisher supplied metadata and other sources. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Access control. http://id.loc.gov/authorities/subjects/sh2007008424 Internet Security measures. Sécurité informatique. Internet Sécurité Mesures. Computer networks Access control fast Computer security fast Internet Security measures fast Mathematics Print version: Hibberd, Gary The Art of Cyber Security Ely : IT Governance Ltd,c2022 9781787783652 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3271935 Volltext |
spellingShingle | Hibberd, Gary The Art of Cyber Security : A Practical Guide to Winning the War on Cyber Crime. Cover -- Title -- Copyright -- About The Author -- Acknowledgements -- Foreword -- Preface -- Contents -- Part 1: The mindset of an artist -- Chapter 1: Introduction -- Security and privacy in a historical context -- Chapter 2: Definitions and clarifications -- Cyber -- Cyber crime -- Cyber security -- Information security -- Chapter 3: Cyber security as an art form -- The artist, the creator -- Education kills creativity -- How you see the world -- But what if what we do isn't perfect? -- In the flow -- You're not just an artist. You are a martial artist. -- Conclusion -- Part 2: Sun Tzu's The Art of War through the lens of cyber security -- Chapter 4: The art of cyber security -- Introduction -- Who was Sun Tzu? -- Translations -- A new kind of warfare -- The need for cyber security is unquestionable -- Let battle commence -- Chapter 5: Warfare and deception -- Chapter 6: Know yourself -- Understanding risk -- Chapter 7: Preparation and evasion -- Chapter 8: Water retains no constant shape -- Chapter 9: Strategy and tactics -- Chapter 10: The vital importance of state -- Chapter 11: The moral law -- Start with why -- Chapter 12: Calculations in battle -- Chapter 13: Rewards of war -- The blame game -- Rousing the C-suite to action -- Chapter 14: Good fighters -- Chapter 15: Signs and signals -- Chapter 16: The general and the sovereign -- Chapter 17: The clever general -- Decision fatigue -- The human condition -- Chapter 18: Disciplined and calm -- The survival arc -- Denial -- Deliberation -- Decisive action -- Chapter 19: Five dangerous faults -- Recklessness, leading to destruction -- Cowardice, which leads to capture -- A hasty temper, which can be provoked by insults -- A delicacy of honour which is sensitive to shame -- Over-solicitude for his men -- Chapter 20: Soldiers -- Chapter 21: Striving for victory -- Chapter 22: Conclusion. Chapter 23: Required reading -- Further reading. Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Access control. http://id.loc.gov/authorities/subjects/sh2007008424 Internet Security measures. Sécurité informatique. Internet Sécurité Mesures. Computer networks Access control fast Computer security fast Internet Security measures fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh2007008424 |
title | The Art of Cyber Security : A Practical Guide to Winning the War on Cyber Crime. |
title_auth | The Art of Cyber Security : A Practical Guide to Winning the War on Cyber Crime. |
title_exact_search | The Art of Cyber Security : A Practical Guide to Winning the War on Cyber Crime. |
title_full | The Art of Cyber Security : A Practical Guide to Winning the War on Cyber Crime. |
title_fullStr | The Art of Cyber Security : A Practical Guide to Winning the War on Cyber Crime. |
title_full_unstemmed | The Art of Cyber Security : A Practical Guide to Winning the War on Cyber Crime. |
title_short | The Art of Cyber Security : |
title_sort | art of cyber security a practical guide to winning the war on cyber crime |
title_sub | A Practical Guide to Winning the War on Cyber Crime. |
topic | Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Access control. http://id.loc.gov/authorities/subjects/sh2007008424 Internet Security measures. Sécurité informatique. Internet Sécurité Mesures. Computer networks Access control fast Computer security fast Internet Security measures fast |
topic_facet | Computer security. Computer networks Access control. Internet Security measures. Sécurité informatique. Internet Sécurité Mesures. Computer networks Access control Computer security Internet Security measures |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=3271935 |
work_keys_str_mv | AT hibberdgary theartofcybersecurityapracticalguidetowinningthewaroncybercrime AT hibberdgary artofcybersecurityapracticalguidetowinningthewaroncybercrime |