Cyber warfare : techniques, tactics and tools for security practitioners / Jason Andress, Steve Winterfeld, Lillian Ablon, Technical Editor.

By: Contributor(s): Material type: TextTextPublisher: Amsterdam ; Boston : Elsevier, [2014]Edition: Second editionDescription: xvii, 306 pages : illustration ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9780124166721 (pbk.)
Other title:
  • Cyberwarfare, techniques, tactics and tools for security practitioners
Subject(s): DDC classification:
  • 355.3/43 23
LOC classification:
  • U163 .A64 2014
Contents:
Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Books Books Kwara State University Library U163 .A64 2014 (Browse shelf(Opens below)) Available 016162-01
Books Books Kwara State University Library U163 .A64 2014 (Browse shelf(Opens below)) Available 016162-02
Books Books Kwara State University Library U163 .A64 2014 (Browse shelf(Opens below)) Available 016162-03

Includes bibliographical references and index.

Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline.

There are no comments on this title.

to post a comment.