搜索


会员资源切换至【手机版】

切换本帖至【手机版】


开启左侧

网络战内幕 Inside Cyber Warfare: Mapping the Cyber Underworld 英文文字版/EPUB/更新第二版[PDF]

[复制链接]
发表于 2021-8-12 21:24:15 | 显示全部楼层 |阅读模式

游客,本帖隐藏的内容需要积分高于 1 才可浏览,您当前积分为 0


资源信息:



中文名


: 网络战内幕


原名


: Inside Cyber Warfare: Mapping the Cyber Underworld


作者


: Jeffrey Carr


图书分类


: 软件


资源格式


: PDF


版本


: 英文文字版/EPUB/更新第二版


出版社


: O'Reilly


书号


: 978-0-596-80215-8


发行时间


: 2009年12月


地区


: 美国


语言


: 英文


概述


:






内容介绍:


You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality. Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009. Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival Find out why many attacks originate from servers in the United States, and who's responsible Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level


内容截图:





目录


: Chapter 1 Assessing the Problem Chapter 2 The Rise of the Non-State Hacker Chapter 3 The Legal Status of Cyber Warfare Chapter 4 Responding to International Cyber Attacks As Acts of War Chapter 5 The Intelligence Component to Cyber Warfare Chapter 6 Non-State Hackers and the Social Web Chapter 7 Follow the Money Chapter 8 Organized Crime in Cyberspace Chapter 9 Investigating Attribution Chapter 10 Weaponizing Malware Chapter 11 The Role of Cyber in Military Doctrine Chapter 12 A Cyber Early Warning Model Chapter 13 Advice for Policy Makers from the Field

主题推广




回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

切换至【手机版】| 主站| Archiver|

JS of wanmeiff.com and vcpic.com Please keep this copyright information, respect of, thank you!JS of wanmeiff.com and vcpic.com Please keep this copyright information, respect of, thank you!

|网站地图

GMT+8, 2026-3-29 22:16 , Processed in 1.294692 second(s), 124 queries .

 

快速回复 返回顶部 返回列表