Fri streaming af mere end 40.000 e- og lydbøger med Saxo Premium Stream e- og lydbøger Prøv gratis

Cyber Warfare

- Techniques, Tactics and Tools for Security Practitioners

af


Cyber Warfare
Du sparer 13% Du sparer 13%
  • Bog, paperback (kr. 294,95) (kr. 294,95)
    • kr. 339,95
    • Leveringstid 2-3 hverdage
    • Forventet levering 17-12-2018
    • Kan leveres før jul
    • 13%
    Format:
    Bog, paperback
    Udgivelsesdato:
    16-10-2013
    Sprog:
    Engelsk
    Sidetal:
    324
    Læsernes anmeldelser
    (0 anmeldelser)
    1. Beskrivelse

      Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.

      Andre udgaver:

      E-bog, ePub
      Bog, paperback

    2. Yderligere info
      ISBN13:
      9780124166721
      Vægt:
      680 g
      Dybde:
      18 mm
      Bredde:
      191 mm
      Højde:
      235 mm
      Format:
      Paperback
      Udgave:
      2nd edition
      • Bibliotekernes beskrivelse

        Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks. Illustrated; Illustrations, unspecified

    3. Anmeldelser

    Fandt du ikke hvad du søgte?

    Hvis denne bog ikke er noget for dig, kan du benytte kategorierne nedenfor til at finde andre titler. Klik på en kategori for at se lignende bøger.