LEADER 03042nam 2200613 450 001 9910453152003321 005 20220125154543.0 010 $a0-12-416633-4 035 $a(CKB)2550000001127052 035 $a(EBL)1463416 035 $a(OCoLC)862048796 035 $a(SSID)ssj0001003419 035 $a(PQKBManifestationID)11570798 035 $a(PQKBTitleCode)TC0001003419 035 $a(PQKBWorkID)11037151 035 $a(PQKB)11004998 035 $a(MiAaPQ)EBC1463416 035 $a(CaSebORM)9780124166721 035 $a(PPN)172744571 035 $a(Au-PeEL)EBL1463416 035 $a(CaPaEBR)ebr10778194 035 $a(CaONFJC)MIL527716 035 $a(EXLCZ)992550000001127052 100 $a20130827h20142014 uy| 0 101 0 $aeng 181 $ctxt 182 $cc 183 $acr 200 10$aCyber warfare $etechniques, tactics and tools for security practitioners 205 $aSecond edition. 210 1$aWaltham, Massachusetts $cSyngress, an imprint of Elsevier$d[2014] 215 $a1 online resource (325 p.) 300 $aDescription based upon print version of record. 320 $aIncludes bibliographical references and index. 327 $aMachine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline. 330 $aCyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the thre 606 $aInformation warfare$vHandbooks, manuals, etc$2FBC 606 $aComputer networks$xSecurity measures$vHandbooks, manuals, etc$2FBC 606 $2FBC$aCyberkrig 608 $aElectronic books. 615 7$aInformation warfare 615 7$aComputer networks$xSecurity measures 615 7$aCyberkrig 686 $a355.02$2z 701 $aWinterfeld$b Steve$0865160 701 $aAblon$b Lillian$0877013 701 $aAndress$b Jason$0865161 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910453152003321 996 $aCyber warfare$91973159 997 $aUNINA