Cyber Warfare, 2nd Edition

Techniques, Tactics and Tools for Security Practitioners

 
Cyber Warfare, 2nd Edition,Jason Andress,Steve Winterfeld,ISBN9780124166721
 
 
 

  &      

Syngress

9780124166721

324

235 X 191

Cyber Warfare provides a comprehensive look at how and why digital warfare is waged!

Print Book

Paperback

In Stock

Estimated Delivery Time
USD 39.95
 
 

Key Features

  • Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
  • Dives deeply into relevant technical and factual information from an insider's point of view
  • Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result

Description

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the threats every time.

Readership

Information security practitioners, network security administrators, computer system administrators, security analysts

Jason Andress

Jason Andress (ISSAP, CISSP, GPEN, CEH) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.

Affiliations and Expertise

(ISSAP, CISSP, GPEN, CEH) is a seasoned security professional with a depth of experience in both the academic and business worlds.

View additional works by Jason Andress

Steve Winterfeld

Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity, Military Intelligence, Certification & Accreditation (C&A), Simulations and Project Management.

Affiliations and Expertise

(CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity and Military Intelligence.

View additional works by Steve Winterfeld

Cyber Warfare, 2nd Edition

Foreword
Introduction

Chapter 1: What is Cyber Warfare?
Chapter 2: The Cyberspace Battlefield
Chapter 3: Cyber Doctrine
Chapter 4: Cyber Warriors
Chapter 5: Logical Weapons
Chapter 6: Physical Weapons
Chapter 7: Psychological Weapons
Chapter 8: Computer Network Exploitation
Chapter 9: Computer Network Attack
Chapter 10: Computer Network Defense
Chapter 11: Non-State Actors in Computer Network Operations
Chapter 12: Legal System Impacts
Chapter 13: Ethics
Chapter 14: Cyberspace Challenges
Chapter 15: The Future of Cyber War
Appendix: Cyber Timeline


Quotes and reviews

"A fifth domain of war has been added to land, air, sea and space: cyber. Malware capable of taking a nuclear program offline was science fiction 5 years ago: Stuxnet demonstrates that information security is now a matter of national security. This timely and necessary book provides an assessment of the current state of cyber warfare, and more importantly, where the conflict is heading. Highly recommended for information security professionals."--Eric Conrad, Lead Author, CISSP Study Guide, President, Backshore Communications

 
 
Free Shipping
Shop with Confidence

Free Shipping around the world
▪ Broad range of products
▪ 30 days return policy
FAQ