Get 2 top 10 audiobooks free with a LoveReading exclusive

LoveReading has teamed up with Audiobooks.com to give you the chance to get 2 free audiobooks when you sign up. Try it for 30 days for free with no strings attached. You can cancel anytime, although we're sure you'll love it. Click the button to find out more:

Find out more

Cyber Warfare Techniques, Tactics and Tools for Security Practitioners Synopsis

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.

Cyber Warfare Techniques, Tactics and Tools for Security Practitioners Press Reviews

Regardless of where the definition of cyber warfare finally settles, be it simply a war waged over the Internet, a technological cold war, network-based hostilities or simply another theater of war, there are without doubt activities that transpire over the wire that require much closer scrutiny not only by the security community but also by governments, businesses and the general public. The authors accurately and adeptly take the reader from the headlines to the front lines with frequent stops in underground communities, legislative halls and anywhere hackers (ethical or otherwise) are in high demand. This book serves as a report on the current cyber state of affairs on a global scale, as a career guide to those looking to enter this burgeoning field, and, most importantly, as a reference on protecting assets that are unmistakably in the field of battle...whether intended or not. --Donald C. Donzal, Editor-In-Chief, The Ethical Hacker Network A fifth domain of war has been added to land, air, sea and space: cyber. Malware capable of taking a nuclear program offline was science fiction 5 years ago: Stuxnet demonstrates that information security is now a matter of national security. This timely and necessary book provides an assessment of the current state of cyber warfare, and more importantly, where the conflict is heading. Highly recommended for information security professionals. --Eric Conrad, Lead Author, CISSP Study Guide, President, Backshore Communications

Book Information

ISBN: 9780124166721
Publication date: 16th October 2013
Author: Jason (CISSP, ISSAP, CISM, GPEN) Andress, Steve ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and lead Winterfeld
Publisher: Syngress Media,U.S.
Format: Paperback / softback
Pagination: 324 pages
Categories: Military tactics, Computer security,

About Jason (CISSP, ISSAP, CISM, GPEN) Andress, Steve ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and lead Winterfeld

Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics. Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma) has a strong ...

More About Jason (CISSP, ISSAP, CISM, GPEN) Andress, Steve ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and lead Winterfeld

Share this book