LEADER 02652oam 2200469 450 001 9910790539503321 005 20190911100030.0 010 $a0-12-416633-4 035 $a(OCoLC)860710941 035 $a(MiFhGG)GVRL8DVN 035 $a(EXLCZ)992550000001127052 100 $a20130827d2014 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aCyber warfare $etechniques, tactics and tools for security practitioners /$fJason Andress, Steve Winterfeld ; Lillian Ablon, technical editor 205 $aSecond edition. 210 1$aWaltham, MA :$cSyngress,$d2014. 215 $a1 online resource (xvii, 306 pages) $cillustrations (some color) 225 0 $aGale eBooks 300 $aDescription based upon print version of record. 311 $a0-12-416672-5 311 $a1-299-96465-6 320 $aIncludes bibliographical references and index. 327 $aMachine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline. 330 $aCyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the thre 606 $aInformation warfare$vHandbooks, manuals, etc 606 $aComputer networks$xSecurity measures$vHandbooks, manuals, etc 615 0$aInformation warfare 615 0$aComputer networks$xSecurity measures 676 $a355.3/43 700 $aAndress$b Jason$0865161 702 $aWinterfeld$b Steve 702 $aAblon$b Lillian 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910790539503321 996 $aCyber warfare$93871841 997 $aUNINA