Book description
The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).
Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology.
The Basics of Cyber Warfare gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.
- Provides a sound understanding of the tools and tactics used in cyber warfare
- Describes both offensive and defensive tactics from an insider's point of view
- Presents doctrine and hands-on techniques to understand as cyber warfare evolves with technology
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Author Biography
- Introduction
- Chapter 1. Cyber Threatscape
- Chapter 2. Cyberspace Battlefield Operations
- Chapter 3. Cyber Doctrine
- Chapter 4. Tools and Techniques
- Chapter 5. Offensive Tactics and Procedures
- Chapter 6. Psychological Weapons
- Chapter 7. Defensive Tactics and Procedures
- Chapter 8. Challenges We Face
- Chapter 9. Where is Cyber Warfare Headed?
- Index
Product information
- Title: The Basics of Cyber Warfare
- Author(s):
- Release date: December 2012
- Publisher(s): Syngress
- ISBN: 9780124051812
You might also like
book
Ethical Hacking and Penetration Testing Guide
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to …
book
Social Engineering, 2nd Edition
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking …
book
Security Policies and Implementation Issues, 2nd Edition
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Security Policies …
book
Social Engineering in IT Security: Tools, Tactics, and Techniques
Cutting-edge social engineering testing techniques "Provides all of the core areas and nearly everything [you] need …