v

您的位置:VeryCD图书计算机与网络

图书资源事务区


《网络战内幕》(Inside Cyber Warfare: Mapping the Cyber Underworld)英文文字版/EPUB/更新第二版[PDF]

  • 状态: 精华资源
  • 摘要:
    图书分类软件
    出版社O'Reilly
    发行时间2009年12月
    语言英文
  • 时间: 2011/06/30 20:34:06 发布 | 2011/12/25 09:16:18 更新
  • 分类: 图书  计算机与网络 

yanhu831

精华资源: 330

全部资源: 330

相关: 分享到新浪微博   转播到腾讯微博   分享到开心网   分享到人人   分享到QQ空间   订阅本资源RSS更新   美味书签  subtitle
该内容尚未提供权利证明,无法提供下载。
中文名网络战内幕
原名Inside Cyber Warfare: Mapping the Cyber Underworld
作者Jeffrey Carr
图书分类软件
资源格式PDF
版本英文文字版/EPUB/更新第二版
出版社O'Reilly
书号978-0-596-80215-8
发行时间2009年12月
地区美国
语言英文
简介

IPB Image

IPB Image

内容介绍:

You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.

Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.

Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations
Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
Find out why many attacks originate from servers in the United States, and who's responsible
Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

内容截图:

IPB Image



目录

Chapter 1 Assessing the Problem
Chapter 2 The Rise of the Non-State Hacker
Chapter 3 The Legal Status of Cyber Warfare
Chapter 4 Responding to International Cyber Attacks As Acts of War
Chapter 5 The Intelligence Component to Cyber Warfare
Chapter 6 Non-State Hackers and the Social Web
Chapter 7 Follow the Money
Chapter 8 Organized Crime in Cyberspace
Chapter 9 Investigating Attribution
Chapter 10 Weaponizing Malware
Chapter 11 The Role of Cyber in Military Doctrine
Chapter 12 A Cyber Early Warning Model
Chapter 13 Advice for Policy Makers from the Field

正在读取……

这里是其它用户补充的资源(我也要补充):

暂无补充资源
正在加载,请稍等...

点击查看所有37网友评论

 

(?) [公告]留口水、评论相关规则 | [活动]每日签到 轻松领取电驴经验

    小贴士:
  1. 类似“顶”、“沙发”之类没有营养的文字,对勤劳贡献的楼主来说是令人沮丧的反馈信息。
  2. 提问之前请再仔细看一遍楼主的说明,或许是您遗漏了。
  3. 勿催片。请相信驴友们对分享是富有激情的,如果确有更新版本,您一定能搜索到。
  4. 请勿到处挖坑绊人、招贴广告。既占空间让人厌烦,又没人会搭理,于人于己都无利。
  5. 如果您发现自己的评论不见了,请参考以上4条。