LoveReading has teamed up with Audiobooks.com to give you the chance to get 2 free audiobooks when you sign up. Try it for 30 days for free with no strings attached. You can cancel anytime, although we're sure you'll love it. Click the button to find out more:Find out more
Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.
|Publication date:||16th October 2013|
|Author:||Jason (CISSP, ISSAP, CISM, GPEN) Andress, Steve ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and lead Winterfeld|
|Format:||Paperback / softback|
|Categories:||Military tactics, Computer security,|
Jason Andress (CISSP, ISSAP, CISM, GPEN) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics. Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma) has a strong ...More About Jason (CISSP, ISSAP, CISM, GPEN) Andress, Steve ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and lead Winterfeld