Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and...
Saved in:
Main Authors: | , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Waltham, Massachusetts
Syngress, an imprint of Elsevier
2014
|
Edition: | Second edition. |
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9780124166721/?ar |
Summary: | This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. |
Item Description: | Includes bibliographical references and index. - Print version record |
Physical Description: | 1 Online-Ressource (325 Seiten) |
ISBN: | 9780124166721 0124166725 9780124166332 0124166334 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047404795 | ||
003 | DE-627-1 | ||
005 | 20240228115352.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2014 xx |||||o 00| ||eng c | ||
020 | |a 9780124166721 |c electronic bk. |9 978-0-12-416672-1 | ||
020 | |a 0124166725 |c electronic bk. |9 0-12-416672-5 | ||
020 | |a 9780124166332 |c electronic bk. |9 978-0-12-416633-2 | ||
020 | |a 0124166334 |c electronic bk. |9 0-12-416633-4 | ||
020 | |a 9780124166721 |9 978-0-12-416672-1 | ||
035 | |a (DE-627-1)047404795 | ||
035 | |a (DE-599)KEP047404795 | ||
035 | |a (ORHE)9780124166721 | ||
035 | |a (DE-627-1)047404795 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a HIS |2 bisacsh | |
072 | 7 | |a TEC |2 bisacsh | |
082 | 0 | |a 355.3/43 |2 23 | |
100 | 1 | |a Andress, Jason |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Cyber Warfare |b Techniques, Tactics and Tools for Security Practitioners |c Jason Andress, Steve Winterfeld |
250 | |a Second edition. | ||
264 | 1 | |a Waltham, Massachusetts |b Syngress, an imprint of Elsevier |c 2014 | |
300 | |a 1 Online-Ressource (325 Seiten) | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. | ||
546 | |a English. | ||
650 | 0 | |a Information warfare |v Handbooks, manuals, etc | |
650 | 0 | |a Computer networks |v Handbooks, manuals, etc |x Security measures | |
650 | 4 | |a Guerre de l'information ; Guides, manuels, etc | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc | |
650 | 4 | |a HISTORY ; Military ; Other | |
650 | 4 | |a TECHNOLOGY & ENGINEERING ; Military Science | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Information warfare | |
650 | 4 | |a handbooks | |
650 | 4 | |a manuals (instructional materials) | |
650 | 4 | |a Handbooks and manuals | |
650 | 4 | |a Handbooks and manuals | |
650 | 4 | |a Guides et manuels | |
700 | 1 | |a Winterfeld, Steve |e VerfasserIn |4 aut | |
776 | 1 | |z 9780124166721 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9780124166721 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780124166721/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-047404795 |
---|---|
_version_ | 1829007816369635328 |
adam_text | |
any_adam_object | |
author | Andress, Jason Winterfeld, Steve |
author_facet | Andress, Jason Winterfeld, Steve |
author_role | aut aut |
author_sort | Andress, Jason |
author_variant | j a ja s w sw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047404795 (DE-599)KEP047404795 (ORHE)9780124166721 |
dewey-full | 355.3/43 |
dewey-hundreds | 300 - Social sciences |
dewey-ones | 355 - Military science |
dewey-raw | 355.3/43 |
dewey-search | 355.3/43 |
dewey-sort | 3355.3 243 |
dewey-tens | 350 - Public administration and military science |
discipline | Militärwissenschaft |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02787cam a22006252c 4500</leader><controlfield tag="001">ZDB-30-ORH-047404795</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115352.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124166721</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-416672-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124166725</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-416672-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124166332</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-0-12-416633-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124166334</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">0-12-416633-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124166721</subfield><subfield code="9">978-0-12-416672-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047404795</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047404795</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780124166721</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047404795</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HIS</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">TEC</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">355.3/43</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Andress, Jason</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Cyber Warfare</subfield><subfield code="b">Techniques, Tactics and Tools for Security Practitioners</subfield><subfield code="c">Jason Andress, Steve Winterfeld</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Massachusetts</subfield><subfield code="b">Syngress, an imprint of Elsevier</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (325 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Information warfare</subfield><subfield code="v">Handbooks, manuals, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="v">Handbooks, manuals, etc</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Guerre de l'information ; Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">HISTORY ; Military ; Other</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">TECHNOLOGY & ENGINEERING ; Military Science</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Information warfare</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">handbooks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">manuals (instructional materials)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Handbooks and manuals</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Handbooks and manuals</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Guides et manuels</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Winterfeld, Steve</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9780124166721</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9780124166721</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780124166721/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047404795 |
illustrated | Not Illustrated |
indexdate | 2025-04-10T09:36:18Z |
institution | BVB |
isbn | 9780124166721 0124166725 9780124166332 0124166334 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (325 Seiten) |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress, an imprint of Elsevier |
record_format | marc |
spelling | Andress, Jason VerfasserIn aut Cyber Warfare Techniques, Tactics and Tools for Security Practitioners Jason Andress, Steve Winterfeld Second edition. Waltham, Massachusetts Syngress, an imprint of Elsevier 2014 1 Online-Ressource (325 Seiten) Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record This book explores the battlefields, participants, and tools and techniques used during today's digital conflicts. The concepts discussed provide those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. English. Information warfare Handbooks, manuals, etc Computer networks Handbooks, manuals, etc Security measures Guerre de l'information ; Guides, manuels, etc Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc HISTORY ; Military ; Other TECHNOLOGY & ENGINEERING ; Military Science Computer networks ; Security measures Information warfare handbooks manuals (instructional materials) Handbooks and manuals Guides et manuels Winterfeld, Steve VerfasserIn aut 9780124166721 Erscheint auch als Druck-Ausgabe 9780124166721 |
spellingShingle | Andress, Jason Winterfeld, Steve Cyber Warfare Techniques, Tactics and Tools for Security Practitioners Information warfare Handbooks, manuals, etc Computer networks Handbooks, manuals, etc Security measures Guerre de l'information ; Guides, manuels, etc Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc HISTORY ; Military ; Other TECHNOLOGY & ENGINEERING ; Military Science Computer networks ; Security measures Information warfare handbooks manuals (instructional materials) Handbooks and manuals Guides et manuels |
title | Cyber Warfare Techniques, Tactics and Tools for Security Practitioners |
title_auth | Cyber Warfare Techniques, Tactics and Tools for Security Practitioners |
title_exact_search | Cyber Warfare Techniques, Tactics and Tools for Security Practitioners |
title_full | Cyber Warfare Techniques, Tactics and Tools for Security Practitioners Jason Andress, Steve Winterfeld |
title_fullStr | Cyber Warfare Techniques, Tactics and Tools for Security Practitioners Jason Andress, Steve Winterfeld |
title_full_unstemmed | Cyber Warfare Techniques, Tactics and Tools for Security Practitioners Jason Andress, Steve Winterfeld |
title_short | Cyber Warfare |
title_sort | cyber warfare techniques tactics and tools for security practitioners |
title_sub | Techniques, Tactics and Tools for Security Practitioners |
topic | Information warfare Handbooks, manuals, etc Computer networks Handbooks, manuals, etc Security measures Guerre de l'information ; Guides, manuels, etc Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc HISTORY ; Military ; Other TECHNOLOGY & ENGINEERING ; Military Science Computer networks ; Security measures Information warfare handbooks manuals (instructional materials) Handbooks and manuals Guides et manuels |
topic_facet | Information warfare Handbooks, manuals, etc Computer networks Handbooks, manuals, etc Security measures Guerre de l'information ; Guides, manuels, etc Réseaux d'ordinateurs ; Sécurité ; Mesures ; Guides, manuels, etc HISTORY ; Military ; Other TECHNOLOGY & ENGINEERING ; Military Science Computer networks ; Security measures Information warfare handbooks manuals (instructional materials) Handbooks and manuals Guides et manuels |
work_keys_str_mv | AT andressjason cyberwarfaretechniquestacticsandtoolsforsecuritypractitioners AT winterfeldsteve cyberwarfaretechniquestacticsandtoolsforsecuritypractitioners |