Introduction to Cyber-Warfare : A Multidisciplinary Approach

個数:1
紙書籍版価格
¥11,181
  • 電子書籍
  • ポイントキャンペーン

Introduction to Cyber-Warfare : A Multidisciplinary Approach

  • 著者名:Shakarian, Paulo/Shakarian, Jana/Ruef, Andrew
  • 価格 ¥7,832 (本体¥7,120)
  • Syngress(2013/05/16発売)
  • 春分の日の三連休!Kinoppy 電子書籍・電子洋書 全点ポイント30倍キャンペーン(~3/22)
  • ポイント 2,130pt (実際に付与されるポイントはご注文内容確認画面でご確認下さい)
  • 言語:ENG
  • ISBN:9780124078147
  • eISBN:9780124079267

ファイル: /

Description

Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.- Provides a multi-disciplinary approach to cyber-warfare, analyzing the information technology, military, policy, social, and scientific issues that are in play- Presents detailed case studies of cyber-attack including inter-state cyber-conflict (Russia-Estonia), cyber-attack as an element of an information operations strategy (Israel-Hezbollah,) and cyber-attack as a tool against dissidents within a state (Russia, Iran)- Explores cyber-attack conducted by large, powerful, non-state hacking organizations such as Anonymous and LulzSec- Covers cyber-attacks directed against infrastructure, such as water treatment plants and power-grids, with a detailed account of Stuxent

Table of Contents

Chapter 1 IntroductionPart I: Cyber AttackChapter 2 – Cyber Attack in an Inter-State ConflictChapter 3 – Cyber Attack in Conjunction with Conventional Military Operations :Chapter 4 – Cyber Attack in Support of Information Operations:Chapter 5 – Cyber Attack Against Internal DissidentsChapter 6 – Cyber Attacks by Non-State Hacking GroupsPart II Cyber Espionage and ExploitationChapter 7 – Chinese Attributed Cyber EspionageChapter 8 – Hacking Unmanned Aerial Vehicles Chapter 9 – Social Network Exploitation: Theory and PracticeChapter 10 The Next Generation of Cyber ExploitationChapter 11 –Chapter 12 – Case StudyPart IIIChapter 11 – Industrial Control SystemsChapter 12 – Cyber Attacks on the Power GridChapter 13 – StuxnetChapter 14- Conclusion and the Future of Cyber War

最近チェックした商品