Cyber Warfare book cover

Cyber Warfare

Techniques, Tactics and Tools for Security Practitioners

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the threats every time.

Audience
Information security practitioners, network security administrators, computer system administrators, security analysts

Paperback, 324 Pages

Published: October 2013

Imprint: Syngress

ISBN: 978-0-12-416672-1

Reviews

  • "A fifth domain of war has been added to land, air, sea and space: cyber. Malware capable of taking a nuclear program offline was science fiction 5 years ago: Stuxnet demonstrates that information security is now a matter of national security. This timely and necessary book provides an assessment of the current state of cyber warfare, and more importantly, where the conflict is heading. Highly recommended for information security professionals."--Eric Conrad, Lead Author, CISSP Study Guide, President, Backshore Communications


Contents

  • Foreword
    Introduction

    Chapter 1: What is Cyber Warfare?
    Chapter 2: The Cyberspace Battlefield
    Chapter 3: Cyber Doctrine
    Chapter 4: Cyber Warriors
    Chapter 5: Logical Weapons
    Chapter 6: Physical Weapons
    Chapter 7: Psychological Weapons
    Chapter 8: Computer Network Exploitation
    Chapter 9: Computer Network Attack
    Chapter 10: Computer Network Defense
    Chapter 11: Non-State Actors in Computer Network Operations
    Chapter 12: Legal System Impacts
    Chapter 13: Ethics
    Chapter 14: Cyberspace Challenges
    Chapter 15: The Future of Cyber War
    Appendix: Cyber Timeline


Advertisement

advert image