Language:
English
日文
簡体中文
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Cyber warfare[electronic resource] :...
~
Andress, Jason.
Cyber warfare[electronic resource] :techniques, tactics and tools for security practitioners /
Record Type:
Language materials, printed : Monograph/item
[NT 15000414]:
355.3/43
Title/Author:
Cyber warfare : techniques, tactics and tools for security practitioners // Jason Andress, Steve Winterfeld, Lillian Ablon, Technical Editor.
remainder title:
Cyberwarfare, techniques, tactics and tools for security practitioners
Author:
Andress, Jason.
other author:
Winterfeld, Steve.
Published:
Amsterdam ; : Elsevier,, 2014.
Description:
xvii, 306 p. : : ill. ;; 24 cm.
Subject:
Information warfare
Subject:
Computer networks - Handbooks, manuals, etc. - Security measures
ISBN:
9780124166721 (electronic bk.)
ISBN:
9780124166721
[NT 15000227]:
Includes bibliographical references and index.
[NT 15000228]:
Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline.
Online resource:
http://www.sciencedirect.com/science/book/9780124166721
Cyber warfare[electronic resource] :techniques, tactics and tools for security practitioners /
Andress, Jason.
Cyber warfare
techniques, tactics and tools for security practitioners /[electronic resource] :Cyberwarfare, techniques, tactics and tools for security practitionersJason Andress, Steve Winterfeld, Lillian Ablon, Technical Editor. - 2nd ed. - Amsterdam ;Elsevier,2014. - xvii, 306 p. :ill. ;24 cm.
Includes bibliographical references and index.
Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline.
ISBN: 9780124166721 (electronic bk.)
LCCN: 2013034031Subjects--Topical Terms:
171512
Information warfare
LC Class. No.: U163 / .A64 2014
Dewey Class. No.: 355.3/43
Cyber warfare[electronic resource] :techniques, tactics and tools for security practitioners /
LDR
:01502cam a2200253 a 4500
001
409883
005
20140627165349.0
008
141231s2014 ne a sbf 001 0 eng
010
$a
2013034031
020
$a
9780124166721 (electronic bk.)
020
$a
9780124166721
035
$a
14000113
040
$a
DLC
$b
eng
$c
DLC
$e
rda
041
0
$a
eng
042
$a
pcc
050
0 0
$a
U163
$b
.A64 2014
082
0 0
$a
355.3/43
$2
23
100
1
$a
Andress, Jason.
$3
553621
245
1 0
$a
Cyber warfare
$h
[electronic resource] :
$b
techniques, tactics and tools for security practitioners /
$c
Jason Andress, Steve Winterfeld, Lillian Ablon, Technical Editor.
246
3
$a
Cyberwarfare, techniques, tactics and tools for security practitioners
250
$a
2nd ed.
260
$a
Amsterdam ;
$a
Boston :
$b
Elsevier,
$c
2014.
300
$a
xvii, 306 p. :
$b
ill. ;
$c
24 cm.
504
$a
Includes bibliographical references and index.
505
8
$a
Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline.
650
0
$a
Information warfare
$3
171512
650
0
$a
Computer networks
$x
Security measures
$v
Handbooks, manuals, etc.
$3
350968
700
1
$a
Winterfeld, Steve.
$3
553622
856
4 0
$u
http://www.sciencedirect.com/science/book/9780124166721
based on 0 review(s)
Multimedia
Multimedia file
http://www.sciencedirect.com/science/book/9780124166721
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login