top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
Autore Shakarian Paulo
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013
Descrizione fisica 1 online resource (256 p.)
Disciplina 355.4
Altri autori (Persone) ShakarianJana
RuefAndrew
Soggetto topico Information warfare
Cyberterrorism
Cyberspace - Security measures
Computer crimes
Data protection
Soggetto genere / forma Electronic books.
ISBN 0-12-407926-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary
Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading
ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes
The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology
Arab Spring
Record Nr. UNISA-996426339703316
Shakarian Paulo  
Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
Introduction to cyber-warfare [[electronic resource] ] : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
Autore Shakarian Paulo
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013
Descrizione fisica 1 online resource (256 p.)
Disciplina 355.4
Altri autori (Persone) ShakarianJana
RuefAndrew
Soggetto topico Information warfare
Cyberterrorism
Cyberspace - Security measures
Computer crimes
Data protection
Soggetto genere / forma Electronic books.
ISBN 0-12-407926-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary
Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading
ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes
The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology
Arab Spring
Record Nr. UNINA-9910459153503321
Shakarian Paulo  
Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Introduction to cyber-warfare : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
Introduction to cyber-warfare : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
Autore Shakarian Paulo
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013
Descrizione fisica 1 online resource (xvii, 318 pages) : illustrations (some color), map
Disciplina 355.4
Collana Gale eBooks
Soggetto topico Information warfare
Cyberterrorism
Cyberspace - Security measures
Computer crimes
Data protection
Soggetto non controllato information assurance - attribution
ISBN 0-12-407926-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary
Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading
ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes
The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology
Arab Spring
Record Nr. UNINA-9910792484503321
Shakarian Paulo  
Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Introduction to cyber-warfare : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
Introduction to cyber-warfare : a multidisciplinary approach / / Paulo Shakarian, Jana Shakarian, Andrew Ruef ; foreword by Sushil Jajodia
Autore Shakarian Paulo
Edizione [1st edition]
Pubbl/distr/stampa Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013
Descrizione fisica 1 online resource (xvii, 318 pages) : illustrations (some color), map
Disciplina 355.4
Collana Gale eBooks
Soggetto topico Information warfare
Cyberterrorism
Cyberspace - Security measures
Computer crimes
Data protection
Soggetto non controllato information assurance - attribution
ISBN 0-12-407926-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Front Cover; Introduction to Cyber-Warfare: A Multidisciplinary Approach; Copyright; Contents; Preface; Foreword; Introduction; References; Biography; Chapter 1: Cyber Warfare: Here and Now; What Is Cyber War?; Is Cyber War a Credible Threat?; Attribution, Deception, and Intelligence; Origin; Structure; Purpose; Information Assurance; References; Part: I Cyber Attack; Chapter 2: Political Cyber Attack Comes of Age in 2007; Reliance on Information as a Vulnerability; Rudimentary but Effective: Denial of Service; Leaving Unwanted Messages: Web Site Defacement; Tools for Denial of Service
The Difficulty of Assigning Blame: Why Attribution Is Tough in a DDoS AttackEstonia Is Hit by Cyber Attacks; The Estonian Government ́s Response; The End of the Attacks; General Response to DDoS; Summary; Suggested Further Reading; References; Chapter 3: How Cyber Attacks Augmented Russian Military Operations; The 2008 Russian Cyber Campaign Against Georgia; What Is Interesting About the Russian Cyber Campaign; Objectives of the Attack; Coordination with Conventional Forces; Reconnaissance and Preparation; Attribution; Preparing for a Cyber-Capable Adversary
Cyber as a Battlefield Operating SystemThe Cyber Aspect of the Area of Interest; Cyber Reconnaissance and Surveillance (R&S); Summary; Suggested Further Reading; References; Chapter 4: When Who Tells the Best Story Wins: Cyber and Information Operations in the Middle East; Hijacking Noncombatant Civilian IP Addresses to Help the War Effort: The Israel-Hezbollah ``July War ́ ́ of 2006; The Information Operations of Hezbollah; Hezbollah Hijacks IP Addresses; Civilians in the Cyber Melee: Operation Cast Lead; IO and Cyber Warfare in the 2008 Israel-Hamas War; Summary; Suggested Further Reading
ReferencesChapter 5: Limiting Free Speech on the Internet: Cyber Attack Against Internal Dissidents in Iran and Russia; DDoS as a Censorship Tool: Why Dissident Groups Are Inherently Vulnerable to Cyber Attacks; Silencing Novaya Gazeta and Other Russian Dissidents; Moving to LiveJournal; Possible Motivation for the 2011 DDoS; The Optima/Darkness Botnet; The ``March(es) of Millions ́ ́; Iran-How the 2009 Elections Led to Aggressive Cyber Operations; The 2009 Elections; The Iranian Cyber Army (ICA); ICA: Beyond Domain Name Hijacking; Who Controls the ICA?; Alleged Iranian Botnet Strikes
The Iranian Cyber PoliceSummary; References; Chapter 6: Cyber Attacks by Nonstate Hacking Groups: The Case of Anonymous and Its Affiliates; ``Chaotic ́ ́ Beginnings: The Chaos Computer Club, CCC; The Roots of the Anon-4chan, 7chan, and Other Message Boards; How We Are Influenced by 4chan: Memes; Anonymous-On Image, Structure, and Motivation; Anonymous-External Connections and Spin Offs; Your Security Is a Joke: LulzSec; Anonymous ́ Modus Operandi; Targeting Governments, Corporations, and Individuals: Notable Hacks on Anonymous; Habbo Hotel Raids; Internet Vigilantism; Project Chanology
Arab Spring
Record Nr. UNINA-9910822035903321
Shakarian Paulo  
Amsterdam [Netherlands], : Morgan Kaufmann Publishers, an imprint of Elsevier, 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Journal of cyber security & information systems
Journal of cyber security & information systems
Pubbl/distr/stampa Utica, NY : , : Cyber Security and Information Systems Information Analysis Center (CSIAC), , 2012-
Descrizione fisica 1 online resource (volumes)
Soggetto topico Computer networks - Security measures
Cyberspace - Security measures
Computer security
Soggetto genere / forma Periodicals.
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti Journal of cyber security and information systems
CSIAC journal
Record Nr. UNINA-9910715464903321
Utica, NY : , : Cyber Security and Information Systems Information Analysis Center (CSIAC), , 2012-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Journal of cybersecurity research
Journal of cybersecurity research
Pubbl/distr/stampa Littleton, CO : , : The Clute Institute, , 2016-
Disciplina 005.8
Soggetto topico Computer security
Cyberspace - Security measures
Hacking - Prevention
Cyberterrorism
Internet - Security measures
Business enterprises - Computer networks - Security measures - United States
Business enterprises - Computer networks - Security measures
Soggetto genere / forma Periodicals.
ISSN 2471-2485
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti JCR
Record Nr. UNINA-9910279759003321
Littleton, CO : , : The Clute Institute, , 2016-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
The management of the National Nuclear Security Administration's Classified Enterprise Secure Network project [[electronic resource]]
The management of the National Nuclear Security Administration's Classified Enterprise Secure Network project [[electronic resource]]
Pubbl/distr/stampa Washington, DC : , : U.S. Dept. of Energy, Office of Inspector General, Office of Audit Services, , [2009]
Descrizione fisica 1 online resource (22 pages)
Collana Audit report
Soggetto topico Nuclear weapons information - Security measures - Evaluation
Computer security - Management
Cyberspace - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910699677903321
Washington, DC : , : U.S. Dept. of Energy, Office of Inspector General, Office of Audit Services, , [2009]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
National Cybersecurity Institute journal
National Cybersecurity Institute journal
Pubbl/distr/stampa Washington, DC : , : National Cybersecurity Institute at Excelsior College, , 2014-
Descrizione fisica 1 online resource
Disciplina 005.7
Soggetto topico Computer security
Cyberspace - Security measures
Soggetto genere / forma Periodicals.
Electronic journals.
Formato Materiale a stampa
Livello bibliografico Periodico
Lingua di pubblicazione eng
Altri titoli varianti NCI journal
Record Nr. UNINA-9910394775203321
Washington, DC : , : National Cybersecurity Institute at Excelsior College, , 2014-
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
NATO cyberspace capability : a strategic and operational evolution / / Jeffrey L. Caton
NATO cyberspace capability : a strategic and operational evolution / / Jeffrey L. Caton
Autore Caton Jeffrey L.
Pubbl/distr/stampa Carlisle Barracks, PA : , : Strategic Studies Institute and U.S. Army War College Press, , 2016
Descrizione fisica 1 online resource (xv, 90 pages)
Soggetto topico Cyberspace operations (Military science)
Cyberspace - Security measures
Cyberinfrastructure - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti North Atlantic Treaty Organization cyberspace capability
Record Nr. UNINA-9910708460203321
Caton Jeffrey L.  
Carlisle Barracks, PA : , : Strategic Studies Institute and U.S. Army War College Press, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
NCS '19 : proceedings of the Northwest Cybersecurity Symposium / / Association for Computing Machinery
NCS '19 : proceedings of the Northwest Cybersecurity Symposium / / Association for Computing Machinery
Pubbl/distr/stampa New York, New York : , : Association for Computing Machinery, , 2019
Descrizione fisica 1 online resource (38 pages) : illustrations
Disciplina 005.8
Collana ACM international conference proceedings series
Soggetto topico Computer security
Cyberspace - Security measures
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910412323103321
New York, New York : , : Association for Computing Machinery, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui