Language:
English
日文
簡体中文
繁體中文
Help
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Introduction to cyberdeception[elect...
~
Rowe, Neil C.
Introduction to cyberdeception[electronic resource] /
Record Type:
Electronic resources : Monograph/item
[NT 15000414]:
005.8
Title/Author:
Introduction to cyberdeception/ by Neil C. Rowe, Julian Rrushi.
Author:
Rowe, Neil C.
other author:
Rrushi, Julian.
Published:
Cham : : Springer International Publishing :, 2016.
Description:
xiv, 334 p. : : ill. (some col.), digital ;; 24 cm.
Contained By:
Springer eBooks
Subject:
Computer science.
Subject:
Computer networks.
Subject:
Computer Science.
Subject:
Systems and Data Security.
Subject:
Computer Communication Networks.
Subject:
Information Systems Applications (incl. Internet)
Subject:
Data Encryption.
Subject:
Computer security.
Subject:
Data encryption (Computer science)
ISBN:
9783319411873
ISBN:
9783319411859
[NT 15000228]:
Introduction -- Psychology of Deception -- Professional Deception -- Deception Methods for Defense -- Deception Methods for Offense -- Delays -- Fakes -- Defensive Camouflage -- False Excuses -- Defensive Social Engineering -- Measuring Deception -- Planning Cyberspace Deception -- Software Engineering of Deceptive Software and Systems -- Decoy I/O Devices -- Deception for the Electrical Power Industry -- Law and Ethics for Software Deception.
[NT 15000229]:
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.
Online resource:
http://dx.doi.org/10.1007/978-3-319-41187-3
Introduction to cyberdeception[electronic resource] /
Rowe, Neil C.
Introduction to cyberdeception
[electronic resource] /by Neil C. Rowe, Julian Rrushi. - Cham :Springer International Publishing :2016. - xiv, 334 p. :ill. (some col.), digital ;24 cm.
Introduction -- Psychology of Deception -- Professional Deception -- Deception Methods for Defense -- Deception Methods for Offense -- Delays -- Fakes -- Defensive Camouflage -- False Excuses -- Defensive Social Engineering -- Measuring Deception -- Planning Cyberspace Deception -- Software Engineering of Deceptive Software and Systems -- Decoy I/O Devices -- Deception for the Electrical Power Industry -- Law and Ethics for Software Deception.
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.
ISBN: 9783319411873
Standard No.: 10.1007/978-3-319-41187-3doiSubjects--Topical Terms:
182962
Computer science.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Introduction to cyberdeception[electronic resource] /
LDR
:02926nmm a2200325 a 4500
001
466191
003
DE-He213
005
20160923151620.0
006
m d
007
cr nn 008maaau
008
170415s2016 gw s 0 eng d
020
$a
9783319411873
$q
(electronic bk.)
020
$a
9783319411859
$q
(paper)
024
7
$a
10.1007/978-3-319-41187-3
$2
doi
035
$a
978-3-319-41187-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
R879 2016
100
1
$a
Rowe, Neil C.
$3
362162
245
1 0
$a
Introduction to cyberdeception
$h
[electronic resource] /
$c
by Neil C. Rowe, Julian Rrushi.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2016.
300
$a
xiv, 334 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Introduction -- Psychology of Deception -- Professional Deception -- Deception Methods for Defense -- Deception Methods for Offense -- Delays -- Fakes -- Defensive Camouflage -- False Excuses -- Defensive Social Engineering -- Measuring Deception -- Planning Cyberspace Deception -- Software Engineering of Deceptive Software and Systems -- Decoy I/O Devices -- Deception for the Electrical Power Industry -- Law and Ethics for Software Deception.
520
$a
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.
650
0
$a
Computer science.
$3
182962
650
0
$a
Computer networks.
$3
174051
650
1 4
$a
Computer Science.
$3
423143
650
2 4
$a
Systems and Data Security.
$3
466229
650
2 4
$a
Computer Communication Networks.
$3
464535
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
463679
650
2 4
$a
Data Encryption.
$3
465773
650
0
$a
Computer security.
$3
338952
650
0
$a
Data encryption (Computer science)
$3
369827
700
1
$a
Rrushi, Julian.
$3
670847
710
2
$a
SpringerLink (Online service)
$3
463450
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-41187-3
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-41187-3
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login