Inside Cyber Warfare - Mapping the Cyber Underworld - E-book - Multi-format

Edition en anglais

Jeffrey Carr

Note moyenne 
Jeffrey Carr - Inside Cyber Warfare - Mapping the Cyber Underworld.
What people are saying about Inside Cyber Warfare "The necessary handbook for the 21st century." --Lewis Shepherd, Chief Tech Officer and Senior... Lire la suite
26,99 € E-book - Multi-format
Vous pouvez lire cet ebook sur les supports de lecture suivants :
Bientôt disponible
Recevez un email dès que l'ouvrage est disponible

Résumé

What people are saying about Inside Cyber Warfare "The necessary handbook for the 21st century." --Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments "A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war." --Jim Stogdill, CTO, Mission Services Accenture You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries.
You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009. - Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine - Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations - Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival - Find out why many attacks originate from servers in the United States, and who's responsible - Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

Caractéristiques

  • Date de parution
    15/12/2009
  • Editeur
    O'Reilly Media
  • ISBN
    978-1-4493-8017-5
  • EAN
    9781449380175
  • Format
    Multi-format
  • Nb. de pages
    240 pages
  • Caractéristiques du format Multi-format
    • Pages
      240
  • Caractéristiques du format ePub
    • Protection num.
      pas de protection
  • Caractéristiques du format PDF
    • Protection num.
      pas de protection
  • Caractéristiques du format Streaming
    • Protection num.
      pas de protection
  • Caractéristiques du format Mobipocket
    • Protection num.
      pas de protection

Avis libraires et clients

Avis audio

Écoutez ce qu'en disent nos libraires !

Vous aimerez aussi

Derniers produits consultés