Cargando…

Cyber Warfare - Truth, Tactics, and Strategies /

Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Underst...

Descripción completa

Detalles Bibliográficos
Autores principales: Cunningham, Chase (Autor), Touhill, Gregory (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Packt Publishing, 2020.
Edición:1st edition.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a22000007a 4500
001 OR_on1147975049
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu||||||||
008 060320s2020 xx o 000 0 eng
040 |a AU@  |b eng  |c AU@  |d UAB  |d OCLCO  |d OCL  |d OCLCO  |d OCLCQ  |d TOH  |d OCLCQ 
020 |z 9781839216992 
020 |z 9781839214486 
024 8 |a 9781839216992 
029 0 |a AU@  |b 000066971701 
029 1 |a AU@  |b 000066870458 
029 1 |a AU@  |b 000071870417 
035 |a (OCoLC)1147975049 
082 0 4 |a 658.478  |q OCoLC  |2 23/eng/20230216 
049 |a UAMI 
100 1 |a Cunningham, Chase,  |e author. 
245 1 0 |a Cyber Warfare - Truth, Tactics, and Strategies /  |c Cunningham, Chase. 
250 |a 1st edition. 
264 1 |b Packt Publishing,  |c 2020. 
300 |a 1 online resource (330 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
520 |a Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Understand how future technologies will impact cyber warfare campaigns and society Future-ready yourself and your business against any cyber threat Book Description The era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare - Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data. What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is for This book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field. 
542 |f Copyright © 2020 Packt Publishing  |g 2020 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 |a Online resource; Title from title page (viewed February 25, 2020) 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Business enterprises  |x Computer networks  |x Security measures. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 0 |a Cyberterrorism. 
650 2 |a Computer Security 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 6 |a Cyberterrorisme. 
650 7 |a Cyberterrorism.  |2 fast  |0 (OCoLC)fst00885802 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Business enterprises  |x Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00842535 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
700 1 |a Touhill, Gregory,  |e author. 
710 2 |a Safari, an O'Reilly Media Company. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781839216992/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
936 |a BATCHLOAD 
994 |a 92  |b IZTAP