Cyber Guerilla - 1st Edition - ISBN: 9780128051979, 9780128052846

Cyber Guerilla

1st Edition

Authors: Jelle Van Haaster Rickey Gevers Martijn Sprengers
eBook ISBN: 9780128052846
Paperback ISBN: 9780128051979
Imprint: Syngress
Published Date: 13th June 2016
Page Count: 142
Tax/VAT will be calculated at check-out Price includes VAT (GST)
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
53.59
37.51
37.51
37.51
37.51
37.51
42.87
42.87
49.95
34.97
34.97
34.97
34.97
34.97
39.96
39.96
30.99
21.69
21.69
21.69
21.69
21.69
24.79
24.79
35.95
25.16
25.16
25.16
25.16
25.16
28.76
28.76
Unavailable
Price includes VAT (GST)
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape.

Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors’ own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.

Key Features

  • Discusses the conceptual and ideological foundation of hackers and hacker groups
  • Provides concrete footholds regarding hacker group strategy
  • Discusses how cyber guerillas are changing the face of cyber warfare and cyber security through asymmetrical, flexible and stealthy means and methods
  • Explains the tactics, techniques, and procedures these hacker groups use in their operations
  • Describes how cyber guerrillas and hackers use the media and influence the public
  • Serves as a must-have guide for anyone who wants to understand—or is responsible for defending against—cyber warfare attacks

Readership

Information security professionals and consultants, system administrators, government and military officials focusing on IT security, IT administrators and managers focused on information security, as well as hackers and penetration testers

Table of Contents

  • About the Authors
  • Foreword
  • Preface
  • Introduction
  • Chapter 1: General principles of cyber guerilla
    • Abstract
    • Introduction
    • The essence of cyber guerilla
    • Cyber guerilla strategy
    • Cyber guerilla tactics
    • Cyber warfare on favorable terrain (When to wage guerilla)
    • Cyber warfare on unfavorable terrain
    • Conclusions
  • Chapter 2: The hacker group
    • Abstract
    • Introduction
    • The hacker as social reformer
    • The hacker as combatant
    • The hacker group
    • Conclusions
  • Chapter 3: Organization of #operations
    • Abstract
    • Introduction
    • Intelligence
    • Operations
    • Considerations during operations
    • Tools and techniques
    • Effects
    • Media strategy
    • Postoperation posturing
  • Chapter 4: Appendices
    • Abstract
    • Introduction
    • Illustrative hacker groups (Rickey Gevers)
    • Future of hacker groups
  • Index

Details

No. of pages:
142
Language:
English
Copyright:
© Syngress 2016
Published:
Imprint:
Syngress
eBook ISBN:
9780128052846
Paperback ISBN:
9780128051979

About the Author

Jelle Van Haaster

Jelle Van Haaster, LL.M. University Utrecht, BA War Studies, Faculty of Military Sciences, is an award-winning writer, software programmer/developer, and speaker. He is an officer in the Royal Netherlands Army and has a diverse background in legal, military, and technical defense matters. Jelle recently developed an award-winning software app for effectively utilizing social media during military operations, and he is the author of multiple scholarly IT-Law, IT, and military-operational publications. He is currently completing his multidisciplinary Ph.D. thesis on the future utility of military Cyber Operations during conflicts at the Netherlands Defense Academy and University of Amsterdam.

Affiliations and Expertise

Netherlands Defense Academy and University of Amsterdam

Rickey Gevers

Rickey Gevers is currently Chief Intelligence Officer at the security firm Redsocks. He has been responsible for numerous revelations regarding high-profile security incidents both national and international. He was, amongst other, the first person to discover key logger used by Dutch law enforcement agencies and uncovered several criminal gangs and their operations. As an expert in technical matters he has been frequently consulted or hired as lead investigator, including in some of the largest security incidents the world has ever seen. Rickey appears frequently in Dutch media and has hosted his own TV show called Hackers.

Affiliations and Expertise

Chief Intelligence Officer, RedSocks

Martijn Sprengers

Martijn Sprengers is an IT security advisor and professional penetration tester who is specialised in conducting covert cyber operations, also called ‘red teaming’. He performs digital threat actor simulation by using real world tactics and techniques to infiltrate complex IT environments for his clients. With his vast knowledge of offensive security he helps international organisations to strengthen their preventive security measures, increase their detection capabilities and prepare themselves for real attacks. He holds an M.Sc. in computer security, performed research on password encryption techniques and has written multiple articles in the field of IT security, cybercrime and cryptography.

Affiliations and Expertise

Red teaming and security advisor

Reviews

"...a how-to manual that covers all the most important aspects of setting up an effective hacker group that means to engage in cyber guerrilla incursions…an interesting and relatively short read." --Help Net Security