Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners

Author:   Jason Andress (CISSP, ISSAP, CISM, GPEN) ,  Steve Winterfeld ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity and Military Intelligence.) ,  Jason Andress (CISSP, ISSAP, CISM, GPEN) ,  Jason Andress (CISSP, ISSAP, CISM, GPEN)
Publisher:   Syngress Media,U.S.
Edition:   2nd edition
ISBN:  

9780124166721


Pages:   324
Publication Date:   22 November 2013
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $105.47 Quantity:  
Add to Cart

Share |

Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners


Add your own review!

Overview

Full Product Details

Author:   Jason Andress (CISSP, ISSAP, CISM, GPEN) ,  Steve Winterfeld ((CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity and Military Intelligence.) ,  Jason Andress (CISSP, ISSAP, CISM, GPEN) ,  Jason Andress (CISSP, ISSAP, CISM, GPEN)
Publisher:   Syngress Media,U.S.
Imprint:   Syngress Media,U.S.
Edition:   2nd edition
Dimensions:   Width: 19.10cm , Height: 1.80cm , Length: 23.50cm
Weight:   0.680kg
ISBN:  

9780124166721


ISBN 10:   0124166725
Pages:   324
Publication Date:   22 November 2013
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline

Reviews

""A fifth domain of war has been added to land, air, sea and space: cyber. Malware capable of taking a nuclear program offline was science fiction 5 years ago: Stuxnet demonstrates that information security is now a matter of national security. This timely and necessary book provides an assessment of the current state of cyber warfare, and more importantly, where the conflict is heading. Highly recommended for information security professionals.""--Eric Conrad, Lead Author, CISSP Study Guide, President, Backshore Communications


A fifth domain of war has been added to land, air, sea and space: cyber. Malware capable of taking a nuclear program offline was science fiction 5 years ago: Stuxnet demonstrates that information security is now a matter of national security. This timely and necessary book provides an assessment of the current state of cyber warfare, and more importantly, where the conflict is heading. Highly recommended for information security professionals. --Eric Conrad, Lead Author, CISSP Study Guide, President, Backshore Communications


"""A fifth domain of war has been added to land, air, sea and space: cyber. Malware capable of taking a nuclear program offline was science fiction 5 years ago: Stuxnet demonstrates that information security is now a matter of national security. This timely and necessary book provides an assessment of the current state of cyber warfare, and more importantly, where the conflict is heading. Highly recommended for information security professionals.""--Eric Conrad, Lead Author, CISSP Study Guide, President, Backshore Communications"


Author Information

Jason Andress (ISSAP, CISSP, GPEN, CEH) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics. Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity, Military Intelligence, Certification & Accreditation (C&A), Simulations and Project Management.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List