|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Neil C. Rowe , Julian RrushiPublisher: Springer International Publishing AG Imprint: Springer International Publishing AG Edition: 1st ed. 2016 Dimensions: Width: 15.50cm , Height: 2.10cm , Length: 23.50cm Weight: 6.447kg ISBN: 9783319411859ISBN 10: 3319411853 Pages: 334 Publication Date: 04 October 2016 Audience: Professional and scholarly , Professional & Vocational Format: Hardback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of ContentsIntroduction.- Psychology of Deception.- Professional Deception.- Deception Methods for Defense.- Deception Methods for Offense.- Delays.- Fakes.- Defensive Camouflage.- False Excuses.- Defensive Social Engineering.- Measuring Deception.- Planning Cyberspace Deception.- Software Engineering of Deceptive Software and Systems.- Decoy I/O Devices.- Deception for the Electrical Power Industry.- Law and Ethics for Software Deception.ReviewsThe purpose of this book is both to provide a systematic overview of cyberdeception and also to provide a study guide for all readers. ... young researchers, managers, and anyone interested in the problem of cyberdeception will find in this book a great opportunity to learn about the topic. I highly recommend this book for anyone who is looking for an engaging and reader-friendly introduction to cyberdeception. (Eugen Petac, Computing Reviews, April, 2017) Author InformationNeil C. Rowe is Professor of Computer Science at the U.S. Naval Postgraduate School where he has been since 1983. He has a Ph.D. in Computer Science from Stanford University (1983). His main research interests are in data mining, digital forensics, modeling of deception, and cyberwarfare. Julian Rrushi is an assistant professor with the Department of Computer Science at Western Washington University, Bellingham, WA. He received a PhD in computer science from the University of Milan in 2009. His research is on cyber security, and includes work on industrial control systems. He worked for several years in industry as a vulnerability researcher before accepting a faculty appointment with Western Washington University. Tab Content 6Author Website:Countries AvailableAll regions |