9780124166721-0124166725-Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

ISBN-13: 9780124166721
ISBN-10: 0124166725
Edition: 2
Author: Jason Andress, Steve Winterfeld
Publication date: 2013
Publisher: Syngress
Format: Paperback 324 pages
FREE US shipping
Rent
35 days
from $37.43 USD
FREE shipping on RENTAL RETURNS
Buy

From $47.12

Rent

From $37.43

Book details

ISBN-13: 9780124166721
ISBN-10: 0124166725
Edition: 2
Author: Jason Andress, Steve Winterfeld
Publication date: 2013
Publisher: Syngress
Format: Paperback 324 pages

Summary

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (ISBN-13: 9780124166721 and ISBN-10: 0124166725), written by authors Jason Andress, Steve Winterfeld, was published by Syngress in 2013. With an overall rating of 4.1 stars, it's a notable title among other Network Security (Security & Encryption, Hacking, Networking & Cloud Computing) books. You can easily purchase or rent Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners (Paperback) from BooksRun, along with many other new and used Network Security books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.33.

Description

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.

This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed.

This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book