عرض عادي

Cyber warfare : techniques, tactics and tools for security practitioners / Jason Andress, Steve Winterfeld ; Russ Rogers, technical editor ; foreword by Stephen Northcutt.

بواسطة:المساهم (المساهمين):نوع المادة : نصنصالناشر:Amsterdam ; Boston : Syngress/Elsevier, [2011]تاريخ حقوق النشر: copyright 2011وصف:xxvii, 289 pages : illustrations ; 24 cmنوع المحتوى:
  • text
نوع الوسائط:
  • unmediated
نوع الناقل:
  • volume
تدمك:
  • 9781597496377 (pbk)
  • 1597496375 (pbk)
الموضوع:تصنيف مكتبة الكونجرس:
  • U163 A64 2011
المحتويات:
What is Cyber warfare? -- The cyberspace battlefield -- Cyber doctrine -- Cyber warriors -- Logical weapons -- Physical weapons -- Psychological weapons -- Computer network exploitation -- Computer network attack -- Computer network defense -- Non-state actors in computer network operations -- Legal system impacts -- Ethics -- Cyberspace challenges -- The future of cyber war -- Appendix: Cyber timeline.
ملخص:"Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks. Dives deeply into relevant technical and factual information from an insider's point of view Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result."-- Publisher.
المقتنيات
نوع المادة المكتبة الحالية رقم الطلب رقم النسخة حالة تاريخ الإستحقاق الباركود
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة U163 A64 2011 (إستعراض الرف(يفتح أدناه)) C.1 Library Use Only | داخل المكتبة فقط 30010010000775
كتاب كتاب UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة U163 A64 2011 (إستعراض الرف(يفتح أدناه)) C.2 المتاح 30010010000876

Includes bibliographical references and index.

What is Cyber warfare? -- The cyberspace battlefield -- Cyber doctrine -- Cyber warriors -- Logical weapons -- Physical weapons -- Psychological weapons -- Computer network exploitation -- Computer network attack -- Computer network defense -- Non-state actors in computer network operations -- Legal system impacts -- Ethics -- Cyberspace challenges -- The future of cyber war -- Appendix: Cyber timeline.

"Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks. Dives deeply into relevant technical and factual information from an insider's point of view Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result."-- Publisher.

شارك

أبوظبي، الإمارات العربية المتحدة

reference@ecssr.ae

97124044780 +

حقوق النشر © 2024 مركز الإمارات للدراسات والبحوث الاستراتيجية جميع الحقوق محفوظة