Cyber Guerilla

Author:   Jelle Van Haaster (Netherlands Defense Academy and University of Amsterdam) ,  Rickey Gevers (Chief Intelligence Officer, RedSocks) ,  Martijn Sprengers (Red teaming and security advisor) ,  Guido Blauuw
Publisher:   Syngress Media,U.S.
ISBN:  

9780128051979


Pages:   142
Publication Date:   13 June 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $131.87 Quantity:  
Add to Cart

Share |

Cyber Guerilla


Add your own review!

Overview

Full Product Details

Author:   Jelle Van Haaster (Netherlands Defense Academy and University of Amsterdam) ,  Rickey Gevers (Chief Intelligence Officer, RedSocks) ,  Martijn Sprengers (Red teaming and security advisor) ,  Guido Blauuw
Publisher:   Syngress Media,U.S.
Imprint:   Syngress Media,U.S.
Dimensions:   Width: 19.10cm , Height: 0.80cm , Length: 23.50cm
Weight:   0.320kg
ISBN:  

9780128051979


ISBN 10:   0128051973
Pages:   142
Publication Date:   13 June 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

1. General Principles 2. The Hacker Group 3. Organisation of #Operations 4. Appendices

Reviews

...a how-to manual that covers all the most important aspects of setting up an effective hacker group that means to engage in cyber guerrilla incursions...an interesting and relatively short read. --Help Net Security


...a how-to manual that covers all the most important aspects of setting up an effective hacker group that means to engage in cyber guerrilla incursions...an interesting and relatively short read. --Help Net Security, Cyber Guerilla


.. .a how-to manual that covers all the most important aspects of setting up an effective hacker group that means to engage in cyber guerrilla incursions an interesting and relatively short read. <b>--Help Net Security, <i>Cyber Guerilla</p></b></i>


Author Information

Jelle Van Haaster, LL.M. University Utrecht, BA War Studies, Faculty of Military Sciences, is an award-winning writer, software programmer/developer, and speaker. He is an officer in the Royal Netherlands Army and has a diverse background in legal, military, and technical defense matters. Jelle recently developed an award-winning software app for effectively utilizing social media during military operations, and he is the author of multiple scholarly IT-Law, IT, and military-operational publications. He is currently completing his multidisciplinary Ph.D. thesis on the future utility of military Cyber Operations during conflicts at the Netherlands Defense Academy and University of Amsterdam. Rickey Gevers is currently Chief Intelligence Officer at the security firm Redsocks. He has been responsible for numerous revelations regarding high-profile security incidents both national and international. He was, amongst other, the first person to discover key logger used by Dutch law enforcement agencies and uncovered several criminal gangs and their operations. As an expert in technical matters he has been frequently consulted or hired as lead investigator, including in some of the largest security incidents the world has ever seen. Rickey appears frequently in Dutch media and has hosted his own TV show called Hackers. Martijn Sprengers is an IT security advisor and professional penetration tester who is specialised in conducting covert cyber operations, also called ‘red teaming’. He performs digital threat actor simulation by using real world tactics and techniques to infiltrate complex IT environments for his clients. With his vast knowledge of offensive security he helps international organisations to strengthen their preventive security measures, increase their detection capabilities and prepare themselves for real attacks. He holds an M.Sc. in computer security, performed research on password encryption techniques and has written multiple articles in the field of IT security, cybercrime and cryptography.

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List