34,99 €
inkl. MwSt.
Versandkostenfrei*
Liefertermin unbestimmt
Melden Sie sich
hier
hier
für den Produktalarm an, um über die Verfügbarkeit des Produkts informiert zu werden.
17 °P sammeln
- Broschiertes Buch
This book addresses the issues that the digital world has created. The culpability, causal links and even liabilities that go towards these war crime atrocities. It tells a side to the world's first ever cyberwar that you would never otherwise see, or possibly hear about.
Andere Kunden interessierten sich auch für
- Julian AshbournPKI Implementation and Infrastructures137,99 €
- Sandip SenInnovative Technologies for Future Living32,99 €
- Shaun Aghili (Canada Concordia University of Edmonton)The Auditor's Guide to Blockchain Technology52,99 €
- Philippe PeretInformation System Audit83,99 €
- Christopher Whyte (USA Virginia Commonwealth University)Understanding Cyber-Warfare176,99 €
- Pierre-Luc PomerleauEvidence-Based Cybersecurity57,99 €
- Paul S WangBecoming a Computational Thinker36,99 €
-
-
-
This book addresses the issues that the digital world has created. The culpability, causal links and even liabilities that go towards these war crime atrocities. It tells a side to the world's first ever cyberwar that you would never otherwise see, or possibly hear about.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 184
- Erscheinungstermin: 10. Februar 2023
- Englisch
- Abmessung: 154mm x 234mm x 15mm
- Gewicht: 320g
- ISBN-13: 9781032346694
- ISBN-10: 1032346698
- Artikelnr.: 66266995
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 184
- Erscheinungstermin: 10. Februar 2023
- Englisch
- Abmessung: 154mm x 234mm x 15mm
- Gewicht: 320g
- ISBN-13: 9781032346694
- ISBN-10: 1032346698
- Artikelnr.: 66266995
Andrew Jenkinson is CEO of Cybersec Innovation Partners. 8 years Risk, compliance and Cyber Security experience. 20 years prior CEO of Charterhouse Risk and Compliance, led a total team from zero to over 500 resources of technical experts including leading a program for Sun Microsystems as a client for nearly ten years and other government contracts. After publishing his first book, Stuxnet to Sunburst and Ransomware and Cybercrime, Andrew was subsequently made a Fellow of the Cyber Theory Institute and acknowledged as a Thought Leader in the field of Public Key Infrastructure, Domain Name System, both the fundamental basic of all security. He has also been named as one of the worlds leading 30 Cyber Security Experts by The European Institute of Risk. Other books by this author: Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare https://www.routledge.com/Stuxnet-to-Sunburst-20-Years-of-Digital-Exploitation-and-Cyber-Warfare/Jenkinson/p/book/9781032068503 Ransomware and Cybercrime https://www.routledge.com/Ransomware-and-Cybercrime/Jenkinson/p/book/9781032235509
Preface. Author. Part I History. Chapter 1 The History of War and Cyber
Warfare. Chapter 2 The History of Cybersecurity. Part II Technology.
Chapter 3 Domain Name System (DNS) Attacks. Chapter 4 Content Delivery
Networks (CDNs). Chapter 5 Cloud Computing: A Gamble? Chapter 6 OSINT:
Open-Source Intelligence. Chapter 7 Digital Perimeter Defences. Part III
Examples of Previous Attacks and Insecurities. Chapter 8 US Government
Security Failings. Chapter 9 UK Government Security Failings. Chapter 10
Okta Cyberattack: More Basic Security Failures. Chapter 11 Stuxnet. Chapter
12 Lloyds: Shortfall of Knowledge. Part IV The Ukraine Cyberwar. Chapter 13
Why Has Russia Invaded Ukraine? Chapter 14 Sanctions on Russia Following
the War in Ukraine. Chapter 15 Eight Years of Cyberattacks on Ukraine.
Chapter 16 Russian Allies and Enemies. Chapter 17 Digital Defences Down.
Chapter 18 Ukraine Report: Ukraine Cyberwar Using Insecure Websites to Take
Over Control. Chapter 19 Microsoft: There Is Something Rotten in Redmond.
Chapter 20 Perimeter Defence Theory in Context: Ukraine. Chapter 21
Cyberattacks against Russia. Chapter 22 Global Security Errors. CONCLUSION.
AFTERWORD. INDEX.
Warfare. Chapter 2 The History of Cybersecurity. Part II Technology.
Chapter 3 Domain Name System (DNS) Attacks. Chapter 4 Content Delivery
Networks (CDNs). Chapter 5 Cloud Computing: A Gamble? Chapter 6 OSINT:
Open-Source Intelligence. Chapter 7 Digital Perimeter Defences. Part III
Examples of Previous Attacks and Insecurities. Chapter 8 US Government
Security Failings. Chapter 9 UK Government Security Failings. Chapter 10
Okta Cyberattack: More Basic Security Failures. Chapter 11 Stuxnet. Chapter
12 Lloyds: Shortfall of Knowledge. Part IV The Ukraine Cyberwar. Chapter 13
Why Has Russia Invaded Ukraine? Chapter 14 Sanctions on Russia Following
the War in Ukraine. Chapter 15 Eight Years of Cyberattacks on Ukraine.
Chapter 16 Russian Allies and Enemies. Chapter 17 Digital Defences Down.
Chapter 18 Ukraine Report: Ukraine Cyberwar Using Insecure Websites to Take
Over Control. Chapter 19 Microsoft: There Is Something Rotten in Redmond.
Chapter 20 Perimeter Defence Theory in Context: Ukraine. Chapter 21
Cyberattacks against Russia. Chapter 22 Global Security Errors. CONCLUSION.
AFTERWORD. INDEX.
Preface. Author. Part I History. Chapter 1 The History of War and Cyber
Warfare. Chapter 2 The History of Cybersecurity. Part II Technology.
Chapter 3 Domain Name System (DNS) Attacks. Chapter 4 Content Delivery
Networks (CDNs). Chapter 5 Cloud Computing: A Gamble? Chapter 6 OSINT:
Open-Source Intelligence. Chapter 7 Digital Perimeter Defences. Part III
Examples of Previous Attacks and Insecurities. Chapter 8 US Government
Security Failings. Chapter 9 UK Government Security Failings. Chapter 10
Okta Cyberattack: More Basic Security Failures. Chapter 11 Stuxnet. Chapter
12 Lloyds: Shortfall of Knowledge. Part IV The Ukraine Cyberwar. Chapter 13
Why Has Russia Invaded Ukraine? Chapter 14 Sanctions on Russia Following
the War in Ukraine. Chapter 15 Eight Years of Cyberattacks on Ukraine.
Chapter 16 Russian Allies and Enemies. Chapter 17 Digital Defences Down.
Chapter 18 Ukraine Report: Ukraine Cyberwar Using Insecure Websites to Take
Over Control. Chapter 19 Microsoft: There Is Something Rotten in Redmond.
Chapter 20 Perimeter Defence Theory in Context: Ukraine. Chapter 21
Cyberattacks against Russia. Chapter 22 Global Security Errors. CONCLUSION.
AFTERWORD. INDEX.
Warfare. Chapter 2 The History of Cybersecurity. Part II Technology.
Chapter 3 Domain Name System (DNS) Attacks. Chapter 4 Content Delivery
Networks (CDNs). Chapter 5 Cloud Computing: A Gamble? Chapter 6 OSINT:
Open-Source Intelligence. Chapter 7 Digital Perimeter Defences. Part III
Examples of Previous Attacks and Insecurities. Chapter 8 US Government
Security Failings. Chapter 9 UK Government Security Failings. Chapter 10
Okta Cyberattack: More Basic Security Failures. Chapter 11 Stuxnet. Chapter
12 Lloyds: Shortfall of Knowledge. Part IV The Ukraine Cyberwar. Chapter 13
Why Has Russia Invaded Ukraine? Chapter 14 Sanctions on Russia Following
the War in Ukraine. Chapter 15 Eight Years of Cyberattacks on Ukraine.
Chapter 16 Russian Allies and Enemies. Chapter 17 Digital Defences Down.
Chapter 18 Ukraine Report: Ukraine Cyberwar Using Insecure Websites to Take
Over Control. Chapter 19 Microsoft: There Is Something Rotten in Redmond.
Chapter 20 Perimeter Defence Theory in Context: Ukraine. Chapter 21
Cyberattacks against Russia. Chapter 22 Global Security Errors. CONCLUSION.
AFTERWORD. INDEX.