000 | 02443nam a22003135i 4500 | ||
---|---|---|---|
003 | TH-BaBU | ||
005 | 20210607164230.0 | ||
008 | 180529s2020 maua| b 001 0 eng d | ||
020 |
_a9781630815769 _qonline |
||
020 |
_a9781630815783 _qonline |
||
040 |
_aTh-BaBU _cTH-BaBU |
||
050 | 4 |
_aHV6773.15.C97 _bP672C 2020 |
|
100 | 1 |
_aPorche, Isaac, _d1968-, _eauthor |
|
245 | 1 | 0 |
_aCyberwarefare : _ban introduction to information-age conflict / _cIssac R. Porche III |
264 | 1 |
_aBoston : _bArtech House, _c2020 |
|
300 | _a1 online resource | ||
336 |
_atext _2rdacontent |
||
337 |
_acomputer _2rdamedia |
||
338 |
_aonline resource _2rdacarrier |
||
490 | 1 | _aArtech House Intelligence and Information Operations Series | |
504 | _aIncludes bibliographical references and index. | ||
520 | _aConflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. As a result, knowledge of the topic is becoming essential across most disciplines. This book reviews and explains the technologies that underlie offensive and defensive cyber operations, which are practiced by a range of cyber actors including state actors, criminal enterprises, activists, and individuals. It explains the processes and technologies that enable the full spectrum of cyber operations. Readers will learn how to use basic tools for cyber security and pen-testing, and also be able to quantitatively assess cyber risk to systems and environments and discern and categorize malicious activity. The book provides key concepts of information age conflict technical basics/fundamentals needed to understand more specific remedies and activities associated with all aspects of cyber operations. It explains techniques associated with offensive cyber operations, with careful distinctions made between cyber ISR, cyber exploitation, and cyber attack. It explores defensive cyber operations and includes case studies that provide practical information, making this book useful for both novice and advanced information warfare practitioners. | ||
650 | 0 | _aCyberterrorism | |
650 | 0 | _aCyberspace operations (Military science) | |
650 | 0 | _aCyber intelligence (Computer security) | |
830 | 0 | _aArtech House Intelligence and Information Operations Series | |
856 | 4 | 1 |
_uhttp://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2450267 _zElectronic Resources |
942 |
_2lcc _cEB |
||
999 |
_c251007 _d251007 |