Paulo Shakarian, Jana Shakarian, Andrew Ruef
Introduction to Cyber-Warfare
A Multidisciplinary Approach
Paulo Shakarian, Jana Shakarian, Andrew Ruef
Introduction to Cyber-Warfare
A Multidisciplinary Approach
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Covers information technology, military, policy, social and scientific issues.
Andere Kunden interessierten sich auch für
- Raj SamaniCSA Guide to Cloud Computing66,99 €
- Bongsik ShinA Practical Introduction to Enterprise Network and Security Management69,99 €
- Michael MeloneDesigning Secure Systems101,99 €
- Bongsik ShinA Practical Introduction to Enterprise Network and Security Management146,99 €
- Richard BejtlichThe Practice of Network Security Monitoring53,99 €
- Securing IoT in Industry 4.0 Applications with Blockchain168,99 €
- Giri GovindarajuluIt's Your Digital Life156,99 €
-
-
-
Covers information technology, military, policy, social and scientific issues.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Elsevier Science
- Seitenzahl: 336
- Erscheinungstermin: 4. Juni 2013
- Englisch
- Abmessung: 233mm x 187mm x 17mm
- Gewicht: 687g
- ISBN-13: 9780124078147
- ISBN-10: 0124078141
- Artikelnr.: 37500816
- Herstellerkennzeichnung
- Produktsicherheitsverantwortliche/r
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Elsevier Science
- Seitenzahl: 336
- Erscheinungstermin: 4. Juni 2013
- Englisch
- Abmessung: 233mm x 187mm x 17mm
- Gewicht: 687g
- ISBN-13: 9780124078147
- ISBN-10: 0124078141
- Artikelnr.: 37500816
- Herstellerkennzeichnung
- Produktsicherheitsverantwortliche/r
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Paulo Shakarian, Ph.D. is a Major in the U.S. Army and an Assistant Professor of Computer Science at the U.S. Military Academy (West Point) teaching classes on computer science and information technology as wells as conducting research on cyber-security, social networks, and artificial intelligence. He has written over twenty papers published in scientific and military journals. Relating to cyber-warfare, he has written the paper "Stuxnet: Cyberwar Revolution in Military Affairs? published in Small Wars Journal and "The 2008 Russian Cyber-Campaign Against Georgia? published in Military Review. His scientific research has also been well received, featured in major news media such including The Economist and Nature. Previously, he has authored Geospatial Abduction: Principles and Practice published by Springer. Paulo holds a Ph.D. and M.S. in computer science from the University of Maryland, College Park, a B.S. in computer science from West Point, and a Depth of Study in Information Assurance also from West Point. Paulo has served two combat tours in Operation Iraqi Freedom. His military awards include the Bronze Star, Meritorious Service Medal, Army Commendation Medal with Valor Device, and Combat Action Badge. Paulo's website is: http://shakarian.net/paulo.
Chapter 1 Introduction
Part I: Cyber Attack
Chapter 2 - Cyber Attack in an Inter-State Conflict
Chapter 3 - Cyber Attack in Conjunction with Conventional Military
Operations :
Chapter 4 - Cyber Attack in Support of Information Operations:
Chapter 5 - Cyber Attack Against Internal Dissidents
Chapter 6 - Cyber Attacks by Non-State Hacking Groups
Part II Cyber Espionage and Exploitation
Chapter 7 - Chinese Attributed Cyber Espionage
Chapter 8 - Hacking Unmanned Aerial Vehicles
Chapter 9 - Social Network Exploitation: Theory and Practice
Chapter 10 The Next Generation of Cyber Exploitation
Chapter 11 -Chapter 12 - Case Study
Part III
Chapter 11 - Industrial Control Systems
Chapter 12 - Cyber Attacks on the Power Grid
Chapter 13 - Stuxnet
Chapter 14- Conclusion and the Future of Cyber War
Part I: Cyber Attack
Chapter 2 - Cyber Attack in an Inter-State Conflict
Chapter 3 - Cyber Attack in Conjunction with Conventional Military
Operations :
Chapter 4 - Cyber Attack in Support of Information Operations:
Chapter 5 - Cyber Attack Against Internal Dissidents
Chapter 6 - Cyber Attacks by Non-State Hacking Groups
Part II Cyber Espionage and Exploitation
Chapter 7 - Chinese Attributed Cyber Espionage
Chapter 8 - Hacking Unmanned Aerial Vehicles
Chapter 9 - Social Network Exploitation: Theory and Practice
Chapter 10 The Next Generation of Cyber Exploitation
Chapter 11 -Chapter 12 - Case Study
Part III
Chapter 11 - Industrial Control Systems
Chapter 12 - Cyber Attacks on the Power Grid
Chapter 13 - Stuxnet
Chapter 14- Conclusion and the Future of Cyber War
Chapter 1 Introduction
Part I: Cyber Attack
Chapter 2 - Cyber Attack in an Inter-State Conflict
Chapter 3 - Cyber Attack in Conjunction with Conventional Military
Operations :
Chapter 4 - Cyber Attack in Support of Information Operations:
Chapter 5 - Cyber Attack Against Internal Dissidents
Chapter 6 - Cyber Attacks by Non-State Hacking Groups
Part II Cyber Espionage and Exploitation
Chapter 7 - Chinese Attributed Cyber Espionage
Chapter 8 - Hacking Unmanned Aerial Vehicles
Chapter 9 - Social Network Exploitation: Theory and Practice
Chapter 10 The Next Generation of Cyber Exploitation
Chapter 11 -Chapter 12 - Case Study
Part III
Chapter 11 - Industrial Control Systems
Chapter 12 - Cyber Attacks on the Power Grid
Chapter 13 - Stuxnet
Chapter 14- Conclusion and the Future of Cyber War
Part I: Cyber Attack
Chapter 2 - Cyber Attack in an Inter-State Conflict
Chapter 3 - Cyber Attack in Conjunction with Conventional Military
Operations :
Chapter 4 - Cyber Attack in Support of Information Operations:
Chapter 5 - Cyber Attack Against Internal Dissidents
Chapter 6 - Cyber Attacks by Non-State Hacking Groups
Part II Cyber Espionage and Exploitation
Chapter 7 - Chinese Attributed Cyber Espionage
Chapter 8 - Hacking Unmanned Aerial Vehicles
Chapter 9 - Social Network Exploitation: Theory and Practice
Chapter 10 The Next Generation of Cyber Exploitation
Chapter 11 -Chapter 12 - Case Study
Part III
Chapter 11 - Industrial Control Systems
Chapter 12 - Cyber Attacks on the Power Grid
Chapter 13 - Stuxnet
Chapter 14- Conclusion and the Future of Cyber War