- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book addresses the issues that the digital world has created. The culpability, causal links and even liabilities that go towards these war crime atrocities. It tells a side to the world's first ever cyberwar that you would never otherwise see, or possibly hear about.
Andere Kunden interessierten sich auch für
- Conflict and Cooperation in Cyberspace156,99 €
- Carl RoperTrade Secret Theft, Industrial Espionage, and the China Threat195,99 €
- Jacqueline D LiptonOur Data, Ourselves102,99 €
- Laurent RichardPegasus10,99 €
- Jon FasmanWe See It All24,99 €
- Laurent RichardPegasus19,99 €
- Justin CrumpCorporate Security Intelligence and Strategic Decision Making201,99 €
-
-
-
This book addresses the issues that the digital world has created. The culpability, causal links and even liabilities that go towards these war crime atrocities. It tells a side to the world's first ever cyberwar that you would never otherwise see, or possibly hear about.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 184
- Erscheinungstermin: 10. Februar 2023
- Englisch
- Abmessung: 234mm x 156mm x 13mm
- Gewicht: 458g
- ISBN-13: 9781032346687
- ISBN-10: 103234668X
- Artikelnr.: 66270087
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 184
- Erscheinungstermin: 10. Februar 2023
- Englisch
- Abmessung: 234mm x 156mm x 13mm
- Gewicht: 458g
- ISBN-13: 9781032346687
- ISBN-10: 103234668X
- Artikelnr.: 66270087
Andrew Jenkinson is CEO of Cybersec Innovation Partners. 8 years Risk, compliance and Cyber Security experience. 20 years prior CEO of Charterhouse Risk and Compliance, led a total team from zero to over 500 resources of technical experts including leading a program for Sun Microsystems as a client for nearly ten years and other government contracts. After publishing his first book, Stuxnet to Sunburst and Ransomware and Cybercrime, Andrew was subsequently made a Fellow of the Cyber Theory Institute and acknowledged as a Thought Leader in the field of Public Key Infrastructure, Domain Name System, both the fundamental basic of all security. He has also been named as one of the worlds leading 30 Cyber Security Experts by The European Institute of Risk. Other books by this author: Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare https://www.routledge.com/Stuxnet-to-Sunburst-20-Years-of-Digital-Exploitation-and-Cyber-Warfare/Jenkinson/p/book/9781032068503 Ransomware and Cybercrime https://www.routledge.com/Ransomware-and-Cybercrime/Jenkinson/p/book/9781032235509
Preface. Author. Part I History. Chapter 1 The History of War and Cyber
Warfare. Chapter 2 The History of Cybersecurity. Part II Technology.
Chapter 3 Domain Name System (DNS) Attacks. Chapter 4 Content Delivery
Networks (CDNs). Chapter 5 Cloud Computing: A Gamble? Chapter 6 OSINT:
Open-Source Intelligence. Chapter 7 Digital Perimeter Defences. Part III
Examples of Previous Attacks and Insecurities. Chapter 8 US Government
Security Failings. Chapter 9 UK Government Security Failings. Chapter 10
Okta Cyberattack: More Basic Security Failures. Chapter 11 Stuxnet. Chapter
12 Lloyds: Shortfall of Knowledge. Part IV The Ukraine Cyberwar. Chapter 13
Why Has Russia Invaded Ukraine? Chapter 14 Sanctions on Russia Following
the War in Ukraine. Chapter 15 Eight Years of Cyberattacks on Ukraine.
Chapter 16 Russian Allies and Enemies. Chapter 17 Digital Defences Down.
Chapter 18 Ukraine Report: Ukraine Cyberwar Using Insecure Websites to Take
Over Control. Chapter 19 Microsoft: There Is Something Rotten in Redmond.
Chapter 20 Perimeter Defence Theory in Context: Ukraine. Chapter 21
Cyberattacks against Russia. Chapter 22 Global Security Errors. CONCLUSION.
AFTERWORD. INDEX.
Warfare. Chapter 2 The History of Cybersecurity. Part II Technology.
Chapter 3 Domain Name System (DNS) Attacks. Chapter 4 Content Delivery
Networks (CDNs). Chapter 5 Cloud Computing: A Gamble? Chapter 6 OSINT:
Open-Source Intelligence. Chapter 7 Digital Perimeter Defences. Part III
Examples of Previous Attacks and Insecurities. Chapter 8 US Government
Security Failings. Chapter 9 UK Government Security Failings. Chapter 10
Okta Cyberattack: More Basic Security Failures. Chapter 11 Stuxnet. Chapter
12 Lloyds: Shortfall of Knowledge. Part IV The Ukraine Cyberwar. Chapter 13
Why Has Russia Invaded Ukraine? Chapter 14 Sanctions on Russia Following
the War in Ukraine. Chapter 15 Eight Years of Cyberattacks on Ukraine.
Chapter 16 Russian Allies and Enemies. Chapter 17 Digital Defences Down.
Chapter 18 Ukraine Report: Ukraine Cyberwar Using Insecure Websites to Take
Over Control. Chapter 19 Microsoft: There Is Something Rotten in Redmond.
Chapter 20 Perimeter Defence Theory in Context: Ukraine. Chapter 21
Cyberattacks against Russia. Chapter 22 Global Security Errors. CONCLUSION.
AFTERWORD. INDEX.
Preface. Author. Part I History. Chapter 1 The History of War and Cyber Warfare. Chapter 2 The History of Cybersecurity. Part II Technology. Chapter 3 Domain Name System (DNS) Attacks. Chapter 4 Content Delivery Networks (CDNs). Chapter 5 Cloud Computing: A Gamble? Chapter 6 OSINT: Open-Source Intelligence. Chapter 7 Digital Perimeter Defences. Part III Examples of Previous Attacks and Insecurities. Chapter 8 US Government Security Failings. Chapter 9 UK Government Security Failings. Chapter 10 Okta Cyberattack: More Basic Security Failures. Chapter 11 Stuxnet. Chapter 12 Lloyds: Shortfall of Knowledge. Part IV The Ukraine Cyberwar. Chapter 13 Why Has Russia Invaded Ukraine? Chapter 14 Sanctions on Russia Following the War in Ukraine. Chapter 15 Eight Years of Cyberattacks on Ukraine. Chapter 16 Russian Allies and Enemies. Chapter 17 Digital Defences Down. Chapter 18 Ukraine Report: Ukraine Cyberwar Using Insecure Websites to Take Over Control. Chapter 19 Microsoft: There Is Something Rotten in Redmond. Chapter 20 Perimeter Defence Theory in Context: Ukraine. Chapter 21 Cyberattacks against Russia. Chapter 22 Global Security Errors. CONCLUSION. AFTERWORD. INDEX.
Preface. Author. Part I History. Chapter 1 The History of War and Cyber
Warfare. Chapter 2 The History of Cybersecurity. Part II Technology.
Chapter 3 Domain Name System (DNS) Attacks. Chapter 4 Content Delivery
Networks (CDNs). Chapter 5 Cloud Computing: A Gamble? Chapter 6 OSINT:
Open-Source Intelligence. Chapter 7 Digital Perimeter Defences. Part III
Examples of Previous Attacks and Insecurities. Chapter 8 US Government
Security Failings. Chapter 9 UK Government Security Failings. Chapter 10
Okta Cyberattack: More Basic Security Failures. Chapter 11 Stuxnet. Chapter
12 Lloyds: Shortfall of Knowledge. Part IV The Ukraine Cyberwar. Chapter 13
Why Has Russia Invaded Ukraine? Chapter 14 Sanctions on Russia Following
the War in Ukraine. Chapter 15 Eight Years of Cyberattacks on Ukraine.
Chapter 16 Russian Allies and Enemies. Chapter 17 Digital Defences Down.
Chapter 18 Ukraine Report: Ukraine Cyberwar Using Insecure Websites to Take
Over Control. Chapter 19 Microsoft: There Is Something Rotten in Redmond.
Chapter 20 Perimeter Defence Theory in Context: Ukraine. Chapter 21
Cyberattacks against Russia. Chapter 22 Global Security Errors. CONCLUSION.
AFTERWORD. INDEX.
Warfare. Chapter 2 The History of Cybersecurity. Part II Technology.
Chapter 3 Domain Name System (DNS) Attacks. Chapter 4 Content Delivery
Networks (CDNs). Chapter 5 Cloud Computing: A Gamble? Chapter 6 OSINT:
Open-Source Intelligence. Chapter 7 Digital Perimeter Defences. Part III
Examples of Previous Attacks and Insecurities. Chapter 8 US Government
Security Failings. Chapter 9 UK Government Security Failings. Chapter 10
Okta Cyberattack: More Basic Security Failures. Chapter 11 Stuxnet. Chapter
12 Lloyds: Shortfall of Knowledge. Part IV The Ukraine Cyberwar. Chapter 13
Why Has Russia Invaded Ukraine? Chapter 14 Sanctions on Russia Following
the War in Ukraine. Chapter 15 Eight Years of Cyberattacks on Ukraine.
Chapter 16 Russian Allies and Enemies. Chapter 17 Digital Defences Down.
Chapter 18 Ukraine Report: Ukraine Cyberwar Using Insecure Websites to Take
Over Control. Chapter 19 Microsoft: There Is Something Rotten in Redmond.
Chapter 20 Perimeter Defence Theory in Context: Ukraine. Chapter 21
Cyberattacks against Russia. Chapter 22 Global Security Errors. CONCLUSION.
AFTERWORD. INDEX.
Preface. Author. Part I History. Chapter 1 The History of War and Cyber Warfare. Chapter 2 The History of Cybersecurity. Part II Technology. Chapter 3 Domain Name System (DNS) Attacks. Chapter 4 Content Delivery Networks (CDNs). Chapter 5 Cloud Computing: A Gamble? Chapter 6 OSINT: Open-Source Intelligence. Chapter 7 Digital Perimeter Defences. Part III Examples of Previous Attacks and Insecurities. Chapter 8 US Government Security Failings. Chapter 9 UK Government Security Failings. Chapter 10 Okta Cyberattack: More Basic Security Failures. Chapter 11 Stuxnet. Chapter 12 Lloyds: Shortfall of Knowledge. Part IV The Ukraine Cyberwar. Chapter 13 Why Has Russia Invaded Ukraine? Chapter 14 Sanctions on Russia Following the War in Ukraine. Chapter 15 Eight Years of Cyberattacks on Ukraine. Chapter 16 Russian Allies and Enemies. Chapter 17 Digital Defences Down. Chapter 18 Ukraine Report: Ukraine Cyberwar Using Insecure Websites to Take Over Control. Chapter 19 Microsoft: There Is Something Rotten in Redmond. Chapter 20 Perimeter Defence Theory in Context: Ukraine. Chapter 21 Cyberattacks against Russia. Chapter 22 Global Security Errors. CONCLUSION. AFTERWORD. INDEX.