Inside Cyber Warfare: Mapping the Cyber Underworld

Valutazione media 3,35
( su 200 valutazioni fornite da Goodreads )
 
9780596802158: Inside Cyber Warfare: Mapping the Cyber Underworld
Vedi tutte le copie di questo ISBN:
 
 

What people are saying about Inside Cyber Warfare

"The necessary handbook for the 21st century."

--Lewis Shepherd, Chief Tech Officer and Senior Fellow, Microsoft Institute for Advanced Technology in Governments

"A must-read for policy makers and leaders who need to understand the big-picture landscape of cyber war."

--Jim Stogdill, CTO, Mission Services Accenture

You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.

  • Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
  • Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations
  • Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
  • Find out why many attacks originate from servers in the United States, and who's responsible
  • Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

L'autore:

Jeffrey Carr (CEO, Taia Global, Inc.) is the author of "Inside Cyber Warfare: Mapping the Cyber Underworld" (O'Reilly Media 2009) and the founder and CEO of Taia Global, Inc., a boutique security consulting firm for Global 2000 companies. His book has been endorsed by General Chilton, former Commander USSTRATCOM and he has had the privilege of speaking at the US Army War College, Air Force Institute of Technology, Chief of Naval Operations Strategic Study Group and at over 60 conferences and seminars. His firm provides specialized cybersecurity services to a select group of companies and their executives in the defense, technology, and communication sectors world-wide.

Contenuti:

Foreword; Preface; How This Book Came to Be; Conventions Used in This Book; Using Code Examples; How to Contact Us; Safari® Books Online; Acknowledgments; Chapter 1: Assessing the Problem; 1.1 The Complex Domain of Cyberspace; 1.2 Cyber Crime; 1.3 Future Threats; 1.4 The Conficker Worm: The Cyber Equivalent of an Extinction Event?; 1.5 Africa: The Future Home of the World’s Largest Botnet?; 1.6 The Way Forward; Chapter 2: The Rise of the Non-State Hacker; 2.1 The StopGeorgia.ru Project Forum; 2.2 The Russian Information War; 2.3 The Gaza Cyber War Between Israeli and Arabic Hackers During Operation Cast Lead; 2.4 Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria; 2.5 Are Non-State Hackers a Protected Asset?; Chapter 3: The Legal Status of Cyber Warfare; 3.1 Nuclear Nonproliferation Treaties; 3.2 The Antarctic Treaty System and Space Law; 3.3 UNCLOS; 3.4 MALT; 3.5 The Law of Armed Conflict; 3.6 Is This an Act of Cyber Warfare?; 3.7 Cyber: The Chaotic Domain; Chapter 4: Responding to International Cyber Attacks As Acts of War; 4.1 Introduction by Jeffrey Carr; 4.2 Introduction; 4.3 The Legal Dilemma; 4.4 The Law of War; 4.5 Non-State Actors and the Law of War; 4.6 Analyzing Cyber Attacks Under Jus ad Bellum; 4.7 The Choice to Use Active Defenses; 4.8 Conclusion; Chapter 5: The Intelligence Component to Cyber Warfare; 5.1 The Korean DDoS Attacks (July 2009); 5.2 One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack; 5.3 Ingushetia Conflict, August 2009; 5.4 The Predictive Role of Intelligence; Chapter 6: Non-State Hackers and the Social Web; 6.1 Russia; 6.2 China; 6.3 The Middle East; 6.4 Pakistani Hackers and Facebook; 6.5 The Dark Side of Social Networks; 6.6 TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences; 6.7 Automating the Process; Chapter 7: Follow the Money; 7.1 False Identities; 7.2 Components of a Bulletproof Network; 7.3 The Bulletproof Network of StopGeorgia.ru; 7.4 SORM-2; 7.5 The Kremlin and the Russian Internet; 7.6 A Three-Tier Model of Command and Control; Chapter 8: Organized Crime in Cyberspace; 8.1 A Subtle Threat; 8.2 Russian Organized Crime and the Kremlin; Chapter 9: Investigating Attribution; 9.1 Using Open Source Internet Data; 9.2 Team Cymru and Its Darknet Report; 9.3 Using WHOIS; Chapter 10: Weaponizing Malware; 10.1 A New Threat Landscape; Chapter 11: The Role of Cyber in Military Doctrine; 11.1 The Russian Federation; 11.2 China Military Doctrine; Chapter 12: A Cyber Early Warning Model; 12.1 Introduction by Jeffrey Carr; 12.2 The Challenge We Face; Chapter 13: Advice for Policy Makers from the Field; 13.1 When It Comes to Cyber Warfare: Shoot the Hostage; 13.2 The United States Should Use Active Defenses to Defend Its Critical Information Systems; 13.3 Scenarios and Options to Responding to Cyber Attacks; 13.4 In Summary; 13.5 Whole-of-Nation Cyber Security; Afterword; Colophon;

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

I migliori risultati di ricerca su AbeBooks

Foto dell'editore

1.

Jeffrey Carr
Editore: O'Reilly Media (2009)
ISBN 10: 0596802153 ISBN 13: 9780596802158
Nuovo Paperback Quantità: 1
Da
Ergodebooks
(Richmond, TX, U.S.A.)
Valutazione libreria

Descrizione libro O'Reilly Media, 2009. Paperback. Condizione: New. 1. Codice articolo DADAX0596802153

Informazioni sul venditore | Contattare il venditore

Compra nuovo
EUR 42,83
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi
Foto dell'editore

2.

Carr, Jeffrey
Editore: O'Reilly Media (2009)
ISBN 10: 0596802153 ISBN 13: 9780596802158
Nuovo Brossura Quantità: 1
Da
GlassFrogBooks
(Hawthorne, CA, U.S.A.)
Valutazione libreria

Descrizione libro O'Reilly Media, 2009. Condizione: New. A+ Customer service! Satisfaction Guaranteed! Book is in NEW condition. Codice articolo 0596802153-2-1

Informazioni sul venditore | Contattare il venditore

Compra nuovo
EUR 43,08
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi
Foto dell'editore

3.

Jeffrey Carr
ISBN 10: 0596802153 ISBN 13: 9780596802158
Nuovo Quantità: 1
Da
BennettBooksLtd
(San Diego, CA, U.S.A.)
Valutazione libreria

Descrizione libro Condizione: New. New. Codice articolo M-0596802153

Informazioni sul venditore | Contattare il venditore

Compra nuovo
EUR 66,42
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 4,14
In U.S.A.
Destinazione, tempi e costi
Foto dell'editore

4.

Jeffrey Carr
ISBN 10: 0596802153 ISBN 13: 9780596802158
Nuovo Quantità: 1
Da
BennettBooksLtd
(San Diego, CA, U.S.A.)
Valutazione libreria

Descrizione libro Condizione: New. New. Codice articolo EX-0596802153

Informazioni sul venditore | Contattare il venditore

Compra nuovo
EUR 66,42
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 4,14
In U.S.A.
Destinazione, tempi e costi
Foto dell'editore

5.

Jeffrey Carr
ISBN 10: 0596802153 ISBN 13: 9780596802158
Nuovo Quantità: 1
Da
BennettBooksLtd
(San Diego, CA, U.S.A.)
Valutazione libreria

Descrizione libro Condizione: New. New. Codice articolo E-0596802153

Informazioni sul venditore | Contattare il venditore

Compra nuovo
EUR 66,42
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 4,14
In U.S.A.
Destinazione, tempi e costi