[NT 42591] Language:
簡体中文
English
繁體中文
[NT 5638] Help
[NT 5480] Login
[NT 59466] Create an account
[NT 5635] Back
[NT 59884] Switch To:
[NT 5556] Labeled
|
[NT 5559] MARC Mode
|
[NT 33762] ISBD
Cyber warfare : techniques, tactics and tools for security practitioners
[NT 42944] Record Type:
[NT 8598] Electronic resources : [NT 40817] monographic
[NT 47348] Title Information:
techniques, tactics and tools for security practitioners
[NT 47261] Author:
AndressJason.,
[NT 47354] Secondary Intellectual Responsibility:
WinterfeldSteve.,
[NT 47351] Place of Publication:
Amsterdam
[NT 47263] Published:
Elsevier;
[NT 47352] Year of Publication:
2014.
[NT 50960] Edition:
2nd ed.
[NT 47264] Description:
xvii, 306 p.ill. : 24 cm.;
[NT 47266] Subject:
Information warfare - Handbooks, manuals, etc. -
[NT 47266] Subject:
Computer networks - Security measures -
[NT 51458] Online resource:
http://www.sciencedirect.com/science/book/9780124166721
[NT 50961] ISBN:
9780124166721electronic bk.
[NT 50961] ISBN:
9780124166721
[NT 60779] Content Note:
Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline.
Cyber warfare : techniques, tactics and tools for security practitioners
Andress, Jason.
Cyber warfare
: techniques, tactics and tools for security practitioners / Jason Andress, Steve Winterfeld, Lillian Ablon, Technical Editor. - 2nd ed.. - Amsterdam : Elsevier, 2014.. - xvii, 306 p. ; ill. ; 24 cm..
Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline..
Includes bibliographical references and index..
ISBN 9780124166721ISBN 9780124166721
Information warfareComputer networks -- Handbooks, manuals, etc. -- Security measures
Winterfeld, Steve.
Cyber warfare : techniques, tactics and tools for security practitioners
LDR
:01594clm a2200313 450
001
303368
005
20140627165349.0
009
14000113
010
1
$a
9780124166721
$b
electronic bk.
010
1
$a
9780124166721
020
$b
2013034031
042
$a
pcc
100
$a
20150126d2014 u y0engy50 b
101
0
$a
eng
102
$a
nl
105
$a
a a 001yy
135
$a
v
200
1
$a
Cyber warfare
$e
techniques, tactics and tools for security practitioners
$f
Jason Andress, Steve Winterfeld, Lillian Ablon, Technical Editor.
204
1
$a
electronic resource
205
$a
2nd ed.
210
$a
Amsterdam
$a
Boston
$d
2014.
$c
Elsevier
215
1
$a
xvii, 306 p.
$c
ill.
$d
24 cm.
320
$a
Includes bibliographical references and index.
327
0
$a
Machine generated contents note: Foreword Introduction Chapter 1. What is Cyber Warfare? Chapter 2. The Cyberspace Battlefield Chapter 3. Cyber Doctrine Chapter 4. Cyber Warriors Chapter 5. Logical Weapons Chapter 6. Physical Weapons Chapter 7. Psychological Weapons Chapter 8. Computer Network Exploitation Chapter 9. Computer Network Attack Chapter 10. Computer Network Defense Chapter 11. Non-State Actors in Computer Network Operations Chapter 12. Legal System Impacts Chapter 13. Ethics Chapter 14. Cyberspace Challenges Chapter 15. The Future of Cyber War Appendix: Cyber Timeline.
517
1
$a
Cyberwarfare, techniques, tactics and tools for security practitioners
606
$a
Information warfare
$x
Handbooks, manuals, etc.
$2
lc
$3
297215
606
$a
Computer networks
$x
Security measures
$x
Handbooks, manuals, etc.
$2
lc
$3
296947
676
$a
355.3/43
$v
23
680
$a
U163
$b
.A64 2014
700
1
$a
Andress
$b
Jason.
$3
297212
702
1
$a
Winterfeld
$b
Steve.
$3
297213
801
0
$
atw
$c
20141127
801
1
$
atw
$c
20141127
856
7
$2
http
$u
http://www.sciencedirect.com/science/book/9780124166721
[NT 59758] based on 0 [NT 59757] review(s)
[NT 59725] Reviews
[NT 59886] Add a review
[NT 59885] and share your thoughts with other readers
Export
[NT 5501410] pickup library
[NT 42721] Processing
...
[NT 48336] Change password
[NT 5480] Login