Buch, Englisch, 336 Seiten, Format (B × H): 187 mm x 233 mm, Gewicht: 687 g
A Multidisciplinary Approach
Buch, Englisch, 336 Seiten, Format (B × H): 187 mm x 233 mm, Gewicht: 687 g
ISBN: 978-0-12-407814-7
Verlag: Elsevier Science
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it.
Zielgruppe
<p>Information security professionals, system administrators. Security managers, security analysts. defense analysts, defense personnel, U.S Cybercom staff</p>
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Computerkriminalität & Hacking
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Interdisziplinäres Wissenschaften Wissenschaften Interdisziplinär Friedens- und Konfliktforschung
- Sozialwissenschaften Politikwissenschaft Internationale Beziehungen Konflikt- und Friedensforschung, Rüstungskontrolle, Abrüstung
- Sozialwissenschaften Politikwissenschaft Militärwesen Nationale und Internationale Sicherheits- und Verteidigungspolitik
Weitere Infos & Material
Chapter 1 Introduction
Part I: Cyber Attack
Chapter 2 - Cyber Attack in an Inter-State Conflict
Chapter 3 - Cyber Attack in Conjunction with Conventional Military Operations:
Chapter 4 - Cyber Attack in Support of Information Operations:
Chapter 5 - Cyber Attack Against Internal Dissidents
Chapter 6 - Cyber Attacks by Non-State Hacking Groups
Part II Cyber Espionage and Exploitation
Chapter 7 - Chinese Attributed Cyber Espionage
Chapter 8 - Hacking Unmanned Aerial Vehicles
Chapter 9 - Social Network Exploitation: Theory and Practice
Chapter 10 The Next Generation of Cyber Exploitation
Chapter 11 -Chapter 12 - Case Study
Part III
Chapter 11 - Industrial Control Systems
Chapter 12 - Cyber Attacks on the Power Grid
Chapter 13 - Stuxnet
Chapter 14- Conclusion and the Future of Cyber War