Cargando…

Waging cyber war : technical challenges and operational constraints /

This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Oakley, Jacob G. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [California] : Apress, [2019]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1120726298
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 190923s2019 caua ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d GGVRL  |d OCLCQ  |d OCLCO  |d OCLCQ 
035 |a (OCoLC)1120726298 
037 |a CL0501000072  |b Safari Books Online 
050 4 |a U167.5.C92 
082 0 4 |a 355.41 
049 |a UAMI 
100 1 |a Oakley, Jacob G.,  |e author. 
245 1 0 |a Waging cyber war :  |b technical challenges and operational constraints /  |c Jacob G. Oakley. 
264 1 |a [California] :  |b Apress,  |c [2019] 
264 2 |a New York :  |b Distributed to the Book trade worldwide by Springer Science+Business Media New York,  |c [2019] 
264 4 |c ©2019 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from cover (Safari, viewed September 20, 2019). 
504 |a Includes bibliographical references. 
505 0 |a Chapter 1. Cyber and warfare -- chapter 2. Legal authority -- chapter 3. Cyber exploitation -- chapter 4. Cyber-attack -- chapter 5. Cyber collection -- chapter 6. Enemy attribution -- chapter 7. Targeting -- chapter 8. Access -- chapter 9. Self-attribution -- chapter 10. Association -- chapter 11. Resource resilience -- chapter 12. Control and ownership -- chapter 13. Challenges -- chapter 14. Contemplation. 
520 |a This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Cyberspace operations (Military science) 
650 0 |a Cyberterrorism. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Cyberguerre (Science militaire) 
650 6 |a Cyberterrorisme. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Cyberspace operations (Military science)  |2 fast  |0 (OCoLC)fst01909446 
650 7 |a Cyberterrorism.  |2 fast  |0 (OCoLC)fst00885802 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484249505/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Gale Cengage Learning  |b GVRL  |n GVRL59TX 
994 |a 92  |b IZTAP