Summer Reading Sale
 
 

Recently Viewed clear list


Original Essays | June 20, 2014

Lauren Owen: IMG The Other Vampire



It's a wild and thundery night. Inside a ramshackle old manor house, a beautiful young girl lies asleep in bed. At the window, a figure watches... Continue »

spacer
$53.35
New Trade Paper
Ships from International Warehouse (read more)
Add to Wishlist
available for shipping only
Not available for In-store Pickup
Qty Store Section
1 International Warehouse Internet- Information

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

by

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Cover

 

  1. This particular item is stocked in an International Warehouse and will ship separately from other items in your shopping cart.

Synopses & Reviews

Publisher Comments:

Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the threats every time.

  • Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
  • Dives deeply into relevant technical and factual information from an insider's point of view
  • Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result

Synopsis:

Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors—our defenses must be ready all the time and our alert systems must detect the threats every time.

Synopsis:

Cyber Warfare provides a comprehensive look at how and why digital warfare is waged!

About the Author

Jason Andress (ISSAP, CISSP, GPEN, CEH) is a seasoned security professional with a depth of experience in both the academic and business worlds. He is presently employed by a major software company, providing global information security oversight, and performing penetration testing, risk assessment, and compliance functions to ensure that the company's assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a Doctorate in Computer Science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.Steve Winterfeld has a strong technical and leadership background in Cyber Security, System Certificating and Accreditation, Training, Military Intelligence, Simulations, and Project Management. He served a 22 year career in the U.S. Army, including Airborne Ranger Infantry Platoon Leader, Military Intelligence Electric Warfare Company Commander, Signal Battalion XO, Command and General Staff instructor and finished by building the NOC / CERT for U.S. Army SOUTHCOM. Steve currently work for TASC where he lead the first Global Hawk Unmanned Aerial Vehicle certification and accreditation, designed the security for the lab network and is currently the lead CyberWarrior instructor, Vulnerability Assessment and Penetration Test team manager, and Tech Dir. for 127 million unit. He holds the CISSP, PMP, SANS GSEC, and Six Sigma certifications and has an MS in Computer Information Systems.

CISSP, PMP, SANS GSEC, and Six Sigma, and hold TS/SCI clearance

Table of Contents

Foreword Introduction Chapter 1: What is Cyber Warfare? Chapter 2: The Cyberspace Battlefield Chapter 3: Cyber Doctrine Chapter 4: Cyber Warriors Chapter 5: Logical Weapons Chapter 6: Physical Weapons Chapter 7: Psychological Weapons Chapter 8: Computer Network Exploitation Chapter 9: Computer Network Attack Chapter 10: Computer Network Defense Chapter 11: Non-State Actors in Computer Network Operations Chapter 12: Legal System Impacts Chapter 13: Ethics Chapter 14: Cyberspace Challenges Chapter 15: The Future of Cyber War Appendix: Cyber Timeline

Product Details

ISBN:
9781597496377
Author:
Winterfeld, Steve
Publisher:
Syngress Publishing
Author:
Andress, Jason
Subject:
General Computers
Subject:
Networking-Computer Security
Publication Date:
20110631
Binding:
TRADE PAPER
Language:
English
Pages:
320
Dimensions:
9.25 x 7.5 in

Other books you might like

  1. The Political Economy of Terrorism New Trade Paper $34.95
  2. Forces of Production: A Social... New Hardcover $66.95
  3. Social Identity and Conflict:... New Hardcover $119.50
  4. Governing China Used Trade Paper $16.50
  5. Biological and Chemical Terrorism: A... New Trade Paper $71.75
  6. The Art of War in an Asymmetric... New Trade Paper $50.25

Related Subjects

Computers and Internet » Computers Reference » General
Computers and Internet » Internet » General
Computers and Internet » Internet » Information
Computers and Internet » Networking » Computer Security
Computers and Internet » Personal Computers » General
Humanities » Philosophy » General
Science and Mathematics » Electricity » General Electronics

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners New Trade Paper
0 stars - 0 reviews
$53.35 In Stock
Product details 320 pages Syngress Publishing - English 9781597496377 Reviews:
"Synopsis" by , Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors—our defenses must be ready all the time and our alert systems must detect the threats every time.
"Synopsis" by , Cyber Warfare provides a comprehensive look at how and why digital warfare is waged!
spacer
spacer
  • back to top
Follow us on...




Powell's City of Books is an independent bookstore in Portland, Oregon, that fills a whole city block with more than a million new, used, and out of print books. Shop those shelves — plus literally millions more books, DVDs, and gifts — here at Powells.com.