Cyber Warfare Cyber Warfare

Cyber Warfare

Techniques, Tactics and Tools for Security Practitioners

    • $49.99
    • $49.99

Publisher Description

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.

This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed.

This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.



- Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks

- Dives deeply into relevant technical and factual information from an insider's point of view

- Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result

GENRE
Computing & Internet
RELEASED
2013
1 October
LANGUAGE
EN
English
LENGTH
324
Pages
PUBLISHER
Syngress
SELLER
Elsevier Ltd.
SIZE
8.4
MB
Cybersecurity Cybersecurity
2013
Official (ISC)2 Guide to the CISSP - ISSMP CBK, Second Edition Official (ISC)2 Guide to the CISSP - ISSMP CBK, Second Edition
2014
NIST Cybersecurity Framework NIST Cybersecurity Framework
2018
Hacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux Hacking for Beginners: Your Guide for Learning the Basics - Hacking and Kali Linux
2022
Cyber Security and AI Cyber Security and AI
2025
Self-Sovereign Identity Self-Sovereign Identity
2021
The Basics of Cyber Warfare The Basics of Cyber Warfare
2012
Ninja Hacking Ninja Hacking
2010
Foundations of Cybersecurity, 2nd Edition Foundations of Cybersecurity, 2nd Edition
2026
Podstawy bezpieczeństwa informacji. Praktyczne wprowadzenie Podstawy bezpieczeństwa informacji. Praktyczne wprowadzenie
2021
Foundations of Information Security Foundations of Information Security
2019
Coding for Penetration Testers Coding for Penetration Testers
2011