31,95 €
31,95 €
inkl. MwSt.
Sofort per Download lieferbar
16 °P sammeln
31,95 €
Als Download kaufen
31,95 €
inkl. MwSt.
Sofort per Download lieferbar
16 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
31,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
16 °P sammeln
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book covers decades of digital eavesdropping and manipulation of agencies to Stuxnet, the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their Nuclear Power facilities to cause collateral damage. It continues all the way to today's Solarwinds attack, codenamed Sunburst.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 3.31MB
Andere Kunden interessierten sich auch für
- Andrew JenkinsonStuxnet to Sunburst (eBook, ePUB)31,95 €
- Lukasz OlejnikPropaganda (eBook, PDF)49,95 €
- Andrew BoyarskyRiding the Wave (eBook, PDF)49,95 €
- Lukasz OlejnikPropaganda (eBook, ePUB)49,95 €
- Andrew BoyarskyRiding the Wave (eBook, ePUB)49,95 €
- Stefan StraußPrivacy and Identity in a Networked Society (eBook, PDF)43,95 €
- Andrew A. BochmanCountering Cyber Sabotage (eBook, PDF)28,95 €
-
-
-
This book covers decades of digital eavesdropping and manipulation of agencies to Stuxnet, the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their Nuclear Power facilities to cause collateral damage. It continues all the way to today's Solarwinds attack, codenamed Sunburst.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 194
- Erscheinungstermin: 14. Oktober 2021
- Englisch
- ISBN-13: 9781000464825
- Artikelnr.: 62503693
- Verlag: Taylor & Francis
- Seitenzahl: 194
- Erscheinungstermin: 14. Oktober 2021
- Englisch
- ISBN-13: 9781000464825
- Artikelnr.: 62503693
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Andrew Jenkinson is CEO of Cybersec Innovation Partners. 8 years Risk, compliance and Cyber Security experience. 20 years prior CEO of Charterhouse Risk and Compliance, led a total team from zero to over 500 resources of technical experts including leading a program for Sun Microsystems as a client for nearly ten years and other government contracts.
Chapter 1. The Worldwide Explosion of Personal Computers and the
Afterthought that is Security. Chapter 2. 9/11 and the Creation of Mass
Data Collection in the Name of Security. . . . Chapter 3. PRISM, Project
Aurora and Early Digital Offensive Capability. Chapter 4. Stuxnet and Zero
Days. Chapter 5. Hush Puppies, Flying Pigs, Growing Tensions, and Easter
Eggs. Chapter 6. Root Cause Analysis, Aston Martins and Concorde. Chapter
7. The Office of Personnel Management and Equifax Breaches. Chapter 8.
Marriot and Cyber Insurance: A Fragile Prop Chapter 9. From Boom to Bust,
or from $3 Billion Flotation to $1 Sale in 18 Months. Chapter 10. Did
Someone Say Critical National Infrastructure and Nuclear Power. Chapter 11.
Cyberattack Fatigue. Chapter 12. Not Secure, the Vatican and Healthcare.
Chapter 13. Australiäs Frustration with China and Assisting the FBI.
Chapter 14. Blackbaud and Third-Party Trust. Chapter 15. Stuxnet to
Sunburst. Chapter 16. AVSVMCLOUD(.)COM (SolarWinds Attack) the Modus
Operandi for Attacks Since Stixnet. Chapter 17. TAO, QUANTUM INSERT and Own
Goals. Chapter 18. Covid-19 Breaches. Chapter 19. Should We be Concerned or
Worried? Our Government and Agencies Have Got This. Chapter 20. Making
Matters Worse ( IoT and 5G). Chapter 21. NSA Obsolete TLS Protocols.
Chapter 22. What Does the Future Hold? ByAsking Better Questions, We Will
Get Better Answers and Take Better Action.
Afterthought that is Security. Chapter 2. 9/11 and the Creation of Mass
Data Collection in the Name of Security. . . . Chapter 3. PRISM, Project
Aurora and Early Digital Offensive Capability. Chapter 4. Stuxnet and Zero
Days. Chapter 5. Hush Puppies, Flying Pigs, Growing Tensions, and Easter
Eggs. Chapter 6. Root Cause Analysis, Aston Martins and Concorde. Chapter
7. The Office of Personnel Management and Equifax Breaches. Chapter 8.
Marriot and Cyber Insurance: A Fragile Prop Chapter 9. From Boom to Bust,
or from $3 Billion Flotation to $1 Sale in 18 Months. Chapter 10. Did
Someone Say Critical National Infrastructure and Nuclear Power. Chapter 11.
Cyberattack Fatigue. Chapter 12. Not Secure, the Vatican and Healthcare.
Chapter 13. Australiäs Frustration with China and Assisting the FBI.
Chapter 14. Blackbaud and Third-Party Trust. Chapter 15. Stuxnet to
Sunburst. Chapter 16. AVSVMCLOUD(.)COM (SolarWinds Attack) the Modus
Operandi for Attacks Since Stixnet. Chapter 17. TAO, QUANTUM INSERT and Own
Goals. Chapter 18. Covid-19 Breaches. Chapter 19. Should We be Concerned or
Worried? Our Government and Agencies Have Got This. Chapter 20. Making
Matters Worse ( IoT and 5G). Chapter 21. NSA Obsolete TLS Protocols.
Chapter 22. What Does the Future Hold? ByAsking Better Questions, We Will
Get Better Answers and Take Better Action.
Chapter 1. The Worldwide Explosion of Personal Computers and the Afterthought that is Security. Chapter 2. 9/11 and the Creation of Mass Data Collection in the Name of Security. . . . Chapter 3. PRISM, Project Aurora and Early Digital Offensive Capability. Chapter 4. Stuxnet and Zero Days. Chapter 5. Hush Puppies, Flying Pigs, Growing Tensions, and Easter Eggs. Chapter 6. Root Cause Analysis, Aston Martins and Concorde. Chapter 7. The Office of Personnel Management and Equifax Breaches. Chapter 8. Marriot and Cyber Insurance: A Fragile Prop Chapter 9. From Boom to Bust, or from $3 Billion Flotation to $1 Sale in 18 Months. Chapter 10. Did Someone Say Critical National Infrastructure and Nuclear Power. Chapter 11. Cyberattack Fatigue. Chapter 12. Not Secure, the Vatican and Healthcare. Chapter 13. Australia's Frustration with China and Assisting the FBI. Chapter 14. Blackbaud and Third-Party Trust. Chapter 15. Stuxnet to Sunburst. Chapter 16. AVSVMCLOUD(.)COM (SolarWinds Attack) the Modus Operandi for Attacks Since Stixnet. Chapter 17. TAO, QUANTUM INSERT and Own Goals. Chapter 18. Covid-19 Breaches. Chapter 19. Should We be Concerned or Worried? Our Government and Agencies Have Got This. Chapter 20. Making Matters Worse ( IoT and 5G). Chapter 21. NSA Obsolete TLS Protocols. Chapter 22. What Does the Future Hold? ByAsking Better Questions, We Will Get Better Answers and Take Better Action.
Chapter 1. The Worldwide Explosion of Personal Computers and the
Afterthought that is Security. Chapter 2. 9/11 and the Creation of Mass
Data Collection in the Name of Security. . . . Chapter 3. PRISM, Project
Aurora and Early Digital Offensive Capability. Chapter 4. Stuxnet and Zero
Days. Chapter 5. Hush Puppies, Flying Pigs, Growing Tensions, and Easter
Eggs. Chapter 6. Root Cause Analysis, Aston Martins and Concorde. Chapter
7. The Office of Personnel Management and Equifax Breaches. Chapter 8.
Marriot and Cyber Insurance: A Fragile Prop Chapter 9. From Boom to Bust,
or from $3 Billion Flotation to $1 Sale in 18 Months. Chapter 10. Did
Someone Say Critical National Infrastructure and Nuclear Power. Chapter 11.
Cyberattack Fatigue. Chapter 12. Not Secure, the Vatican and Healthcare.
Chapter 13. Australiäs Frustration with China and Assisting the FBI.
Chapter 14. Blackbaud and Third-Party Trust. Chapter 15. Stuxnet to
Sunburst. Chapter 16. AVSVMCLOUD(.)COM (SolarWinds Attack) the Modus
Operandi for Attacks Since Stixnet. Chapter 17. TAO, QUANTUM INSERT and Own
Goals. Chapter 18. Covid-19 Breaches. Chapter 19. Should We be Concerned or
Worried? Our Government and Agencies Have Got This. Chapter 20. Making
Matters Worse ( IoT and 5G). Chapter 21. NSA Obsolete TLS Protocols.
Chapter 22. What Does the Future Hold? ByAsking Better Questions, We Will
Get Better Answers and Take Better Action.
Afterthought that is Security. Chapter 2. 9/11 and the Creation of Mass
Data Collection in the Name of Security. . . . Chapter 3. PRISM, Project
Aurora and Early Digital Offensive Capability. Chapter 4. Stuxnet and Zero
Days. Chapter 5. Hush Puppies, Flying Pigs, Growing Tensions, and Easter
Eggs. Chapter 6. Root Cause Analysis, Aston Martins and Concorde. Chapter
7. The Office of Personnel Management and Equifax Breaches. Chapter 8.
Marriot and Cyber Insurance: A Fragile Prop Chapter 9. From Boom to Bust,
or from $3 Billion Flotation to $1 Sale in 18 Months. Chapter 10. Did
Someone Say Critical National Infrastructure and Nuclear Power. Chapter 11.
Cyberattack Fatigue. Chapter 12. Not Secure, the Vatican and Healthcare.
Chapter 13. Australiäs Frustration with China and Assisting the FBI.
Chapter 14. Blackbaud and Third-Party Trust. Chapter 15. Stuxnet to
Sunburst. Chapter 16. AVSVMCLOUD(.)COM (SolarWinds Attack) the Modus
Operandi for Attacks Since Stixnet. Chapter 17. TAO, QUANTUM INSERT and Own
Goals. Chapter 18. Covid-19 Breaches. Chapter 19. Should We be Concerned or
Worried? Our Government and Agencies Have Got This. Chapter 20. Making
Matters Worse ( IoT and 5G). Chapter 21. NSA Obsolete TLS Protocols.
Chapter 22. What Does the Future Hold? ByAsking Better Questions, We Will
Get Better Answers and Take Better Action.
Chapter 1. The Worldwide Explosion of Personal Computers and the Afterthought that is Security. Chapter 2. 9/11 and the Creation of Mass Data Collection in the Name of Security. . . . Chapter 3. PRISM, Project Aurora and Early Digital Offensive Capability. Chapter 4. Stuxnet and Zero Days. Chapter 5. Hush Puppies, Flying Pigs, Growing Tensions, and Easter Eggs. Chapter 6. Root Cause Analysis, Aston Martins and Concorde. Chapter 7. The Office of Personnel Management and Equifax Breaches. Chapter 8. Marriot and Cyber Insurance: A Fragile Prop Chapter 9. From Boom to Bust, or from $3 Billion Flotation to $1 Sale in 18 Months. Chapter 10. Did Someone Say Critical National Infrastructure and Nuclear Power. Chapter 11. Cyberattack Fatigue. Chapter 12. Not Secure, the Vatican and Healthcare. Chapter 13. Australia's Frustration with China and Assisting the FBI. Chapter 14. Blackbaud and Third-Party Trust. Chapter 15. Stuxnet to Sunburst. Chapter 16. AVSVMCLOUD(.)COM (SolarWinds Attack) the Modus Operandi for Attacks Since Stixnet. Chapter 17. TAO, QUANTUM INSERT and Own Goals. Chapter 18. Covid-19 Breaches. Chapter 19. Should We be Concerned or Worried? Our Government and Agencies Have Got This. Chapter 20. Making Matters Worse ( IoT and 5G). Chapter 21. NSA Obsolete TLS Protocols. Chapter 22. What Does the Future Hold? ByAsking Better Questions, We Will Get Better Answers and Take Better Action.