This book explores the battlefields, participants and the tools and techniques used during today's digital conflicts.
Introduction
Threatscape
Military Doctrine
Cyber Doctrine
Tools and Techniques
Offensive Tactics and Procedures
Psychological Weapons / Social Engineering
Defensive Tactics and Procedures
Challenges We Face
The Future of Technology and Impacts on Cyber Warfare
Steve Winterfeld (CISSP, PMP, SANS GSEC, Six Sigma) has a strong technical and leadership background in Cybersecurity, Military Intelligence, Certification & Accreditation (C&A), Simulations and Project Management. Jason Andress (ISSAP, CISSP, GPEN, CEH) is a seasoned security professional with a depth of experience in both the academic and business worlds. Presently he carries out information security oversight duties, performing penetration testing, risk assessment, and compliance functions to ensure that critical assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a doctorate in computer science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.
"Given the scope of conventional warfare and cyber warfare, at under 150 pages, the book takes a very high-level approach to the topic.For those looking for a general introduction to the topic, The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice is a good place to start."--RSA Conference.com, March 11, 2013 "This is a thin book on a broad and deep topic, which gave me pause initially, but as it turns out, the book is thoughtfully written and will definitely be useful for educating managers and security professionals who need to broaden their thinking beyond physical security. It provides a dozen pages or so on each of the big topics in computer network security.This book won't give you everything you need to know for incident handling or certification, but it can serve as a first step in a manager's education in computer network security."--Security Management.com
Ask a Question About this Product More... |