Surviving Cyberwar
 
A termék adatai:

ISBN13:9781605906881
ISBN10:1605906883
Kötéstípus:Puhakötés
Terjedelem:176 oldal
Méret:232x155x13 mm
Súly:272 g
Nyelv:angol
0
Témakör:

Surviving Cyberwar

 
Kiadó: Government Institutes
Megjelenés dátuma:
Kötetek száma: Paperback
 
Normál ár:

Kiadói listaár:
GBP 48.00
Becsült forint ár:
23 184 Ft (22 080 Ft + 5% áfa)
Miért becsült?
 
Az Ön ára:

21 329 (20 314 Ft + 5% áfa )
Kedvezmény(ek): 8% (kb. 1 855 Ft)
A kedvezmény csak az 'Értesítés a kedvenc témákról' hírlevelünk címzettjeinek rendeléseire érvényes.
Kattintson ide a feliratkozáshoz
 
Beszerezhetőség:

Becsült beszerzési idő: A Prosperónál jelenleg nincsen raktáron, de a kiadónál igen. Beszerzés kb. 3-5 hét..
A Prosperónál jelenleg nincsen raktáron.
Nem tudnak pontosabbat?
 
  példányt

 
Rövid leírás:

This book examines in depth the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. Through investigations of the most significant and damaging cyber attacks, the author introduces the reader to cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks.

Hosszú leírás:
Military and intelligence leaders agree that the next major war is not likely to be fought on the battleground but in cyber space. Richard Stiennon argues the era of cyber warfare has already begun. Recent cyber attacks on United States government departments and the Pentagon corroborate this claim. China has compromised email servers at the German Chancellery, Whitehall, and the Pentagon. In August 2008, Russia launched a cyber attack against Georgia that was commensurate with their invasion of South Ossetia. This was the first time that modern cyber attacks were used in conjunction with a physical attack.
 
Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. In Surviving Cyberwar, Stiennon introduces cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks.
 
The book:

?begins with Shawn Carpenter and his discovery that China had hacked into his work place, Sandia Labs;

?follows the rise of cyber espionage on the part of the Chinese People's Liberation Army (PLA) as increasingly sophisticated and overt attacks are carried out against government and military networks around the world;

?moves from cyber espionage to cyberwar itself, revealing the rise of distributed denial of service (DDoS) as a means of attacking servers, websites, and countries;

?provides a historical perspective on technology and warfare is provided, drawing on lessons learned from Sun Tsu to Lawrence of Arabia to Winston Churchill; and

?finishes by considering how major democracies are preparing for cyberwar and predicts ways that a new era of cyber conflict is going to impact the Internet, privacy, and the way the world works.
 
This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs.
 
 

Richard Stiennon's Surviving Cyberwar is not only a valuable primer on the alarmingly advanced state of the art of cyber conflict but a much-needed guide for companies, governments, and others on how to think about protecting themselves.
Tartalomjegyzék:
Chapter 1 Titan Rain and Shawn Carpenter Chapter 2 The Red Wars Chapter 3 Countering Cyber Espionage Chapter 4 Toppling Email Servers Chapter 5 The Pentagon Chapter 6 Geopolitical Cyber Hotspots Chapter 7 DDoS Defense Chapter 8 Crowd Sourcing Cyber Attacks Chapter 9 Oh Estonia Chapter 10 Cyberwar Cuts a Swath through Eastern Europe Chapter 11 Georgia: The First Cyberwar Chapter 12 Conflict Causes Change Chapter 13 Four Pillars of Cyberwar Chapter 14 Cyber Preparedness Chapter 15 Repercussions