This book examines in depth the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. Through investigations of the most significant and damaging cyber attacks, the author introduces the reader to cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks.
This book examines in depth the major recent cyber attacks that have taken place around the world, discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. Through investigations of the most significant and damaging cyber attacks, the author introduces the reader to cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks.Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Richard Stiennon is an industry analyst, that writes and speaks about the IT security industry. He has presented on the topic of cybersecurity in 29 countries on six continents. He is a lecturer at Charles Sturt University in Australia. He is the author of Surviving Cyberwar (Government Institutes, 2010) and Washington Post Best Seller, There Will Be Cyberwar. He writes for Forbes, CSO Magazine, and The Analyst Syndicate. He is a member of the advisory board at the Information Governance Initiative and sits on the Responsible Recycling (R2) Technical Advisory Committee, the standard for electronic waste. Stiennon was Chief Strategy Officer for Blancco Technology Group, the Chief Marketing Officer for Fortinet, Inc. and VP Threat Research at Webroot Software. Prior to that he was VP Research at Gartner, Inc. He has a B.S. in Aerospace Engineering and his MA in War in the Modern World from King's College, London. Follow @cyberwar on Twitter.
Inhaltsangabe
Chapter 1 Titan Rain and Shawn Carpenter Chapter 2 The Red Wars Chapter 3 Countering Cyber Espionage Chapter 4 Toppling Email Servers Chapter 5 The Pentagon Chapter 6 Geopolitical Cyber Hotspots Chapter 7 DDoS Defense Chapter 8 Crowd Sourcing Cyber Attacks Chapter 9 Oh Estonia Chapter 10 Cyberwar Cuts a Swath through Eastern Europe Chapter 11 Georgia: The First Cyberwar Chapter 12 Conflict Causes Change Chapter 13 Four Pillars of Cyberwar Chapter 14 Cyber Preparedness Chapter 15 Repercussions