- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book covers decades of digital eavesdropping and manipulation of agencies to Stuxnet, the world¿s first use of digital code and digital certificates for offensive purposes against the Iranians and their Nuclear Power facilities to cause collateral damage. It continues all the way to today¿s Solarwinds attack, codenamed Sunburst.
Andere Kunden interessierten sich auch für
- Steve KingLosing the Cybersecurity War146,99 €
- Arun SoniThe Cybersecurity Self-Help Guide160,99 €
- Ravi DasProtecting Information Assets and It Infrastructure in the Cloud160,99 €
- Eleanor E ThompsonThe Insider Threat95,99 €
- Bongsik ShinA Practical Introduction to Enterprise Network and Security Management148,99 €
- Bongsik ShinA Practical Introduction to Enterprise Network and Security Management69,99 €
- James BoneCognitive Risk146,99 €
-
-
-
This book covers decades of digital eavesdropping and manipulation of agencies to Stuxnet, the world¿s first use of digital code and digital certificates for offensive purposes against the Iranians and their Nuclear Power facilities to cause collateral damage. It continues all the way to today¿s Solarwinds attack, codenamed Sunburst.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 182
- Erscheinungstermin: 15. Oktober 2021
- Englisch
- Abmessung: 234mm x 156mm x 13mm
- Gewicht: 454g
- ISBN-13: 9781032068497
- ISBN-10: 1032068493
- Artikelnr.: 62274503
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd (Sales)
- Seitenzahl: 182
- Erscheinungstermin: 15. Oktober 2021
- Englisch
- Abmessung: 234mm x 156mm x 13mm
- Gewicht: 454g
- ISBN-13: 9781032068497
- ISBN-10: 1032068493
- Artikelnr.: 62274503
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Andrew Jenkinson is CEO of Cybersec Innovation Partners. 8 years Risk, compliance and Cyber Security experience. 20 years prior CEO of Charterhouse Risk and Compliance, led a total team from zero to over 500 resources of technical experts including leading a program for Sun Microsystems as a client for nearly ten years and other government contracts.
Chapter 1. The Worldwide Explosion of Personal Computers and the
Afterthought that is Security. Chapter 2. 9/11 and the Creation of Mass
Data Collection in the Name of Security. . . . Chapter 3. PRISM, Project
Aurora and Early Digital Offensive Capability. Chapter 4. Stuxnet and Zero
Days. Chapter 5. Hush Puppies, Flying Pigs, Growing Tensions, and Easter
Eggs. Chapter 6. Root Cause Analysis, Aston Martins and Concorde. Chapter
7. The Office of Personnel Management and Equifax Breaches. Chapter 8.
Marriot and Cyber Insurance: A Fragile Prop Chapter 9. From Boom to Bust,
or from $3 Billion Flotation to $1 Sale in 18 Months. Chapter 10. Did
Someone Say Critical National Infrastructure and Nuclear Power. Chapter 11.
Cyberattack Fatigue. Chapter 12. Not Secure, the Vatican and Healthcare.
Chapter 13. Australiäs Frustration with China and Assisting the FBI.
Chapter 14. Blackbaud and Third-Party Trust. Chapter 15. Stuxnet to
Sunburst. Chapter 16. AVSVMCLOUD(.)COM (SolarWinds Attack) the Modus
Operandi for Attacks Since Stixnet. Chapter 17. TAO, QUANTUM INSERT and Own
Goals. Chapter 18. Covid-19 Breaches. Chapter 19. Should We be Concerned or
Worried? Our Government and Agencies Have Got This. Chapter 20. Making
Matters Worse ( IoT and 5G). Chapter 21. NSA Obsolete TLS Protocols.
Chapter 22. What Does the Future Hold? ByAsking Better Questions, We Will
Get Better Answers and Take Better Action.
Afterthought that is Security. Chapter 2. 9/11 and the Creation of Mass
Data Collection in the Name of Security. . . . Chapter 3. PRISM, Project
Aurora and Early Digital Offensive Capability. Chapter 4. Stuxnet and Zero
Days. Chapter 5. Hush Puppies, Flying Pigs, Growing Tensions, and Easter
Eggs. Chapter 6. Root Cause Analysis, Aston Martins and Concorde. Chapter
7. The Office of Personnel Management and Equifax Breaches. Chapter 8.
Marriot and Cyber Insurance: A Fragile Prop Chapter 9. From Boom to Bust,
or from $3 Billion Flotation to $1 Sale in 18 Months. Chapter 10. Did
Someone Say Critical National Infrastructure and Nuclear Power. Chapter 11.
Cyberattack Fatigue. Chapter 12. Not Secure, the Vatican and Healthcare.
Chapter 13. Australiäs Frustration with China and Assisting the FBI.
Chapter 14. Blackbaud and Third-Party Trust. Chapter 15. Stuxnet to
Sunburst. Chapter 16. AVSVMCLOUD(.)COM (SolarWinds Attack) the Modus
Operandi for Attacks Since Stixnet. Chapter 17. TAO, QUANTUM INSERT and Own
Goals. Chapter 18. Covid-19 Breaches. Chapter 19. Should We be Concerned or
Worried? Our Government and Agencies Have Got This. Chapter 20. Making
Matters Worse ( IoT and 5G). Chapter 21. NSA Obsolete TLS Protocols.
Chapter 22. What Does the Future Hold? ByAsking Better Questions, We Will
Get Better Answers and Take Better Action.
Chapter 1. The Worldwide Explosion of Personal Computers and the Afterthought that is Security. Chapter 2. 9/11 and the Creation of Mass Data Collection in the Name of Security. . . . Chapter 3. PRISM, Project Aurora and Early Digital Offensive Capability. Chapter 4. Stuxnet and Zero Days. Chapter 5. Hush Puppies, Flying Pigs, Growing Tensions, and Easter Eggs. Chapter 6. Root Cause Analysis, Aston Martins and Concorde. Chapter 7. The Office of Personnel Management and Equifax Breaches. Chapter 8. Marriot and Cyber Insurance: A Fragile Prop Chapter 9. From Boom to Bust, or from $3 Billion Flotation to $1 Sale in 18 Months. Chapter 10. Did Someone Say Critical National Infrastructure and Nuclear Power. Chapter 11. Cyberattack Fatigue. Chapter 12. Not Secure, the Vatican and Healthcare. Chapter 13. Australia's Frustration with China and Assisting the FBI. Chapter 14. Blackbaud and Third-Party Trust. Chapter 15. Stuxnet to Sunburst. Chapter 16. AVSVMCLOUD(.)COM (SolarWinds Attack) the Modus Operandi for Attacks Since Stixnet. Chapter 17. TAO, QUANTUM INSERT and Own Goals. Chapter 18. Covid-19 Breaches. Chapter 19. Should We be Concerned or Worried? Our Government and Agencies Have Got This. Chapter 20. Making Matters Worse ( IoT and 5G). Chapter 21. NSA Obsolete TLS Protocols. Chapter 22. What Does the Future Hold? ByAsking Better Questions, We Will Get Better Answers and Take Better Action.
Chapter 1. The Worldwide Explosion of Personal Computers and the
Afterthought that is Security. Chapter 2. 9/11 and the Creation of Mass
Data Collection in the Name of Security. . . . Chapter 3. PRISM, Project
Aurora and Early Digital Offensive Capability. Chapter 4. Stuxnet and Zero
Days. Chapter 5. Hush Puppies, Flying Pigs, Growing Tensions, and Easter
Eggs. Chapter 6. Root Cause Analysis, Aston Martins and Concorde. Chapter
7. The Office of Personnel Management and Equifax Breaches. Chapter 8.
Marriot and Cyber Insurance: A Fragile Prop Chapter 9. From Boom to Bust,
or from $3 Billion Flotation to $1 Sale in 18 Months. Chapter 10. Did
Someone Say Critical National Infrastructure and Nuclear Power. Chapter 11.
Cyberattack Fatigue. Chapter 12. Not Secure, the Vatican and Healthcare.
Chapter 13. Australiäs Frustration with China and Assisting the FBI.
Chapter 14. Blackbaud and Third-Party Trust. Chapter 15. Stuxnet to
Sunburst. Chapter 16. AVSVMCLOUD(.)COM (SolarWinds Attack) the Modus
Operandi for Attacks Since Stixnet. Chapter 17. TAO, QUANTUM INSERT and Own
Goals. Chapter 18. Covid-19 Breaches. Chapter 19. Should We be Concerned or
Worried? Our Government and Agencies Have Got This. Chapter 20. Making
Matters Worse ( IoT and 5G). Chapter 21. NSA Obsolete TLS Protocols.
Chapter 22. What Does the Future Hold? ByAsking Better Questions, We Will
Get Better Answers and Take Better Action.
Afterthought that is Security. Chapter 2. 9/11 and the Creation of Mass
Data Collection in the Name of Security. . . . Chapter 3. PRISM, Project
Aurora and Early Digital Offensive Capability. Chapter 4. Stuxnet and Zero
Days. Chapter 5. Hush Puppies, Flying Pigs, Growing Tensions, and Easter
Eggs. Chapter 6. Root Cause Analysis, Aston Martins and Concorde. Chapter
7. The Office of Personnel Management and Equifax Breaches. Chapter 8.
Marriot and Cyber Insurance: A Fragile Prop Chapter 9. From Boom to Bust,
or from $3 Billion Flotation to $1 Sale in 18 Months. Chapter 10. Did
Someone Say Critical National Infrastructure and Nuclear Power. Chapter 11.
Cyberattack Fatigue. Chapter 12. Not Secure, the Vatican and Healthcare.
Chapter 13. Australiäs Frustration with China and Assisting the FBI.
Chapter 14. Blackbaud and Third-Party Trust. Chapter 15. Stuxnet to
Sunburst. Chapter 16. AVSVMCLOUD(.)COM (SolarWinds Attack) the Modus
Operandi for Attacks Since Stixnet. Chapter 17. TAO, QUANTUM INSERT and Own
Goals. Chapter 18. Covid-19 Breaches. Chapter 19. Should We be Concerned or
Worried? Our Government and Agencies Have Got This. Chapter 20. Making
Matters Worse ( IoT and 5G). Chapter 21. NSA Obsolete TLS Protocols.
Chapter 22. What Does the Future Hold? ByAsking Better Questions, We Will
Get Better Answers and Take Better Action.
Chapter 1. The Worldwide Explosion of Personal Computers and the Afterthought that is Security. Chapter 2. 9/11 and the Creation of Mass Data Collection in the Name of Security. . . . Chapter 3. PRISM, Project Aurora and Early Digital Offensive Capability. Chapter 4. Stuxnet and Zero Days. Chapter 5. Hush Puppies, Flying Pigs, Growing Tensions, and Easter Eggs. Chapter 6. Root Cause Analysis, Aston Martins and Concorde. Chapter 7. The Office of Personnel Management and Equifax Breaches. Chapter 8. Marriot and Cyber Insurance: A Fragile Prop Chapter 9. From Boom to Bust, or from $3 Billion Flotation to $1 Sale in 18 Months. Chapter 10. Did Someone Say Critical National Infrastructure and Nuclear Power. Chapter 11. Cyberattack Fatigue. Chapter 12. Not Secure, the Vatican and Healthcare. Chapter 13. Australia's Frustration with China and Assisting the FBI. Chapter 14. Blackbaud and Third-Party Trust. Chapter 15. Stuxnet to Sunburst. Chapter 16. AVSVMCLOUD(.)COM (SolarWinds Attack) the Modus Operandi for Attacks Since Stixnet. Chapter 17. TAO, QUANTUM INSERT and Own Goals. Chapter 18. Covid-19 Breaches. Chapter 19. Should We be Concerned or Worried? Our Government and Agencies Have Got This. Chapter 20. Making Matters Worse ( IoT and 5G). Chapter 21. NSA Obsolete TLS Protocols. Chapter 22. What Does the Future Hold? ByAsking Better Questions, We Will Get Better Answers and Take Better Action.