Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Waging Cyber War: Technical Challenges and Operational Constraints, Oakley Jacob G.


Варианты приобретения
Цена: 6288.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-08-18
Ориентировочная дата поставки: конец Сентября - начало Октября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Oakley Jacob G.
Название:  Waging Cyber War: Technical Challenges and Operational Constraints
ISBN: 9781484249499
Издательство: Springer
Классификация:

ISBN-10: 1484249496
Обложка/Формат: Paperback
Страницы: 192
Вес: 0.38 кг.
Дата издания: 14.08.2019
Язык: English
Издание: 1st ed.
Иллюстрации: 12 illustrations, color; 12 illustrations, black and white; xi, 186 p. 24 illus., 12 illus. in color.
Размер: 254 x 178 x 11
Читательская аудитория: Professional & vocational
Подзаголовок: Technical challenges and operational constraints
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Германии
Описание: Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. You will quickly appreciate the difficulty and complexity of executing warfare within the cyber domain. Included is a detailed illustration of cyber warfare against the backdrop of national and international policy, laws, and conventions relating to war.Waging Cyber War details technical resources and activities required by the cyber war fighter. Even non-technical readers will gain an understanding of how the obstacles encountered are not easily mitigated and the irreplaceable nature of many cyber resources.You will walk away more informed on how war is conducted from a cyber perspective, and perhaps why it shouldn’t be waged. And you will come to know how cyber warfare has been covered unrealistically, technically misrepresented, and misunderstood by many.What You’ll LearnUnderstand the concept of warfare and how cyber fits into the war-fighting domainBe aware of what constitutes and is involved in defining war and warfare as well as how cyber fits in that paradigm and vice versaDiscover how the policies being put in place to plan and conduct cyber warfare reflect a lack of understanding regarding the technical means and resources necessary to perform such actionsKnow what it means to do cyber exploitation, attack, and intelligence gathering; when one is preferred over the other; and their specific values and impacts on each otherBe familiar with the need for, and challenges of, enemy attributionRealize how to develop and scope a target in cyber warfareGrasp the concept of self-attribution: what it is, the need to avoid it, and its impactSee what goes into establishing the access from which you will conduct cyber warfare against an identified targetAppreciate how association affects cyber warfareRecognize the need for resource resilience, control, and ownershipWalk through the misconceptions and an illustrative analogy of why cyber warfare doesnt always work as it is prescribedWho This Book Is ForAnyone curious about warfare in the era of cyber everything, those involved in cyber operations and cyber warfare, and security practitioners and policy or decision makers. The book is also for anyone with a cell phone, smart fridge, or other computing device as you are a part of the attack surface.
Дополнительное описание: Chapter 1: Cyber and Warfare.- Chapter 2: Legal Authority.- Chapter 3: Cyber Exploitation.- Chapter 4: Cyber-Attack.- Chapter 5: Cyber Collection.- Chapter 6: Enemy Attribution.- Chapter 7: Targeting.- Chapter 8: Access.- Chapter 9: Self-Attribution.- Cha



Proceedings of International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 202

Автор: Pattnaik Prasant Kumar, Sain Mangal, Al-Absi Ahmed A.
Название: Proceedings of International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 202
ISBN: 981157992X ISBN-13(EAN): 9789811579929
Издательство: Springer
Рейтинг:
Цена: 39130.00 р.
Наличие на складе: Нет в наличии.

Описание: This book presents high-quality research papers presented at the International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020) held during July 7-8, 2020, in the Department of Smart Computing, Kyungdong University, Global Campus, South Korea.

Artificial Intelligence in Cyber Security: Impact and Implications: Security Challenges, Technical and Ethical Issues, Forensic Investigative Challeng

Автор: Montasari Reza, Jahankhani Hamid
Название: Artificial Intelligence in Cyber Security: Impact and Implications: Security Challenges, Technical and Ethical Issues, Forensic Investigative Challeng
ISBN: 3030880397 ISBN-13(EAN): 9783030880392
Издательство: Springer
Рейтинг:
Цена: 23757.00 р.
Наличие на складе: Нет в наличии.

Описание: The book provides a valuable reference for cyber security experts, digital forensic practitioners and network security professionals.

Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks

Автор: Pang
Название: Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
ISBN: 9811305196 ISBN-13(EAN): 9789811305191
Издательство: Springer
Рейтинг:
Цена: 13974.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered.

Basics of cyber warfare

Автор: Winterfeld, Steve ((cissp, Pmp, Sans Gsec, Six Sigma) Has A Strong Technical And Leadership Background In Cybersecurity And Military Intelligence.) An
Название: Basics of cyber warfare
ISBN: 0124047378 ISBN-13(EAN): 9780124047372
Издательство: Elsevier Science
Рейтинг:
Цена: 4041.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).

Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World

Автор: Amit Kumar Tyagi
Название: Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World
ISBN: 1668452502 ISBN-13(EAN): 9781668452509
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 55856.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Discusses the design and development of different machine learning systems, including next generation applications, in order to mitigate cyber-attacks and address security challenges in everyday technologies. The book also explores methods and algorithms of learning for implementing better security methods in fields such as business and healthcare.

Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks

Автор: Zhong-Hua Pang; Guo-Ping Liu; Donghua Zhou; Dehui
Название: Networked Predictive Control of Systems with Communication Constraints and Cyber Attacks
ISBN: 9811344396 ISBN-13(EAN): 9789811344398
Издательство: Springer
Рейтинг:
Цена: 19564.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems.

Automotive Cyber Security: Introduction, Challenges, and Standardization

Автор: Kim Shiho, Shrestha Rakesh
Название: Automotive Cyber Security: Introduction, Challenges, and Standardization
ISBN: 9811580553 ISBN-13(EAN): 9789811580550
Издательство: Springer
Цена: 15372.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: It is very helpful for automotive engineers, graduate students and technological administrators who want to know more about security technology as well as to readers with a security background and experience who want to know more about cybersecurity concerns in modern and future automotive applications and cybersecurity.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия