|
|
|||
|
||||
OverviewFull Product DetailsAuthor: Paulo Shakarian , Jana Shakarian , Andrew RuefPublisher: Syngress Media,U.S. Imprint: Syngress Media,U.S. Dimensions: Width: 19.10cm , Height: 1.80cm , Length: 23.50cm Weight: 0.690kg ISBN: 9780124078147ISBN 10: 0124078141 Pages: 336 Publication Date: 01 August 2013 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand We will order this item for you from a manufactured on demand supplier. Table of ContentsChapter 1 Introduction Part I: Cyber Attack Chapter 2 – Cyber Attack in an Inter-State Conflict Chapter 3 – Cyber Attack in Conjunction with Conventional Military Operations : Chapter 4 – Cyber Attack in Support of Information Operations: Chapter 5 – Cyber Attack Against Internal Dissidents Chapter 6 – Cyber Attacks by Non-State Hacking Groups Part II Cyber Espionage and Exploitation Chapter 7 – Chinese Attributed Cyber Espionage Chapter 8 – Hacking Unmanned Aerial Vehicles Chapter 9 – Social Network Exploitation: Theory and Practice Chapter 10 The Next Generation of Cyber Exploitation Chapter 11 –Chapter 12 – Case Study Part III Chapter 11 – Industrial Control Systems Chapter 12 – Cyber Attacks on the Power Grid Chapter 13 – Stuxnet Chapter 14- Conclusion and the Future of Cyber WarReviewsThis book will give you a good base on the topic of cyber warfare and its different aspects. The military-style approach to the subject turned out to be perfect - the book is a balanced blend of history and technical details that makes it very easy to read. --HelpNetSecurity.org, July 24, 2013 For Soldiers and leaders engaging in the ongoing battles of cyberspace, this book will be indispensable. --Lieutenant General (ret.) Charles P. Otstott The most thorough study to date of the many facets of cyber-warfare - for scholars and practitioners alike. --Gerardo I. Simari, Senior Researcher - Dept. of Computer Science, University of Oxford For Soldiers and leaders engaging in the ongoing battles of cyberspace, this book will be indispensable. - Lieutenant General (ret.) Charles P. Otstott The most thorough study to date of the many facets of cyber-warfare - for scholars and practitioners alike. - Gerardo I. Simari, Senior Researcher - Dept. of Computer Science, University of Oxford Author InformationPaulo Shakarian, Ph.D. is a Major in the U.S. Army and an Assistant Professor of Computer Science at the U.S. Military Academy (West Point) teaching classes on computer science and information technology as wells as conducting research on cyber-security, social networks, and artificial intelligence. He has written over twenty papers published in scientific and military journals. Relating to cyber-warfare, he has written the paper “Stuxnet: Cyberwar Revolution in Military Affairs published in Small Wars Journal and “The 2008 Russian Cyber-Campaign Against Georgia published in Military Review. His scientific research has also been well received, featured in major news media such including The Economist and Nature. Previously, he has authored Geospatial Abduction: Principles and Practice published by Springer. Paulo holds a Ph.D. and M.S. in computer science from the University of Maryland, College Park, a B.S. in computer science from West Point, and a Depth of Study in Information Assurance also from West Point. Paulo has served two combat tours in Operation Iraqi Freedom. His military awards include the Bronze Star, Meritorious Service Medal, Army Commendation Medal with Valor Device, and Combat Action Badge. Paulo’s website is: http://shakarian.net/paulo. Jana Shakarian is a Research Fellow at the West Point Network Science Center conducting sociological research in support of various DoD-sponsored projects. Previously, Jana has worked as a research assistant at Laboratory for Computational Cultural Dynamics at the University of Maryland where she extensively studied terrorist groups in south-east Asia in addition to other research initiatives at the intersection of social and computational science applied to military and security problems. She has written numerous papers in addition to co-authoring the book Computational Analysis of Terrorist Groups: Lashkar-e-Tabia, to be published by Springer in the near future. Jana holds an M.A. in cultural and social anthropology and sociology from the Johannes Gutenberg University, Mainz where her thesis was on “new war theory. Jana’s website is: http://shakarian.net/jana. Andrew Ruef is a Senior Systems Engineer at the firm Trail of Bits (New York, NY) where he conducts information security analysis. Andrew has nearly a decade of industry experience in computer network security and software engineering, working on various projects including reverse-engineering of malware, analysis of computer network traffic for security purposes, system administration, and development of secure software products. Andrew has also written numerous white papers on information security and has spoken at various conferences such including a recent conference talk at the Dagstuhl computer research center in Germany. Currently, Andrew is working toward his B.S. in Computer Science at the University of Maryland, College Park. A sampling of some of Andrew’s technical work can be found here: http://www.kyrus-tech.com/tag/andrew-ruef/. Tab Content 6Author Website:Countries AvailableAll regions |