Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of The basics of cyber warfare: understanding the fundamentals of cyber warfare in theory and practice
Bookmark Share

Text

The basics of cyber warfare: understanding the fundamentals of cyber warfare in theory and practice

Winterfeld, Steve - Personal Name; Andress, Jason - Personal Name;

Table of Contents

Chapter 1. Cyber Threatscape
How Did We Get Here?
Attack Methodology Plus Tools/Techniques Used
Attackers (The Types of Threats)
How Most Organizations Defend Today (Defensive Mountain Range)?
Targeted Capabilities (What We Should be Defending)
Summary
References

Chapter 2. Cyberspace Battlefield Operations
What is Cyber Warfare?
Cyber War—Hype or Reality
Boundaries in Cyber Warfare
Where Cyber Fits in the War-Fighting Domains
Summary
References

Chapter 3. Cyber Doctrine
Current US Doctrine
Sample Doctrine / Strategy From Around the World
Some Key Military Principles that Must be Adapted to Cyber Warfare
Summary
References

Chapter 4. Tools and Techniques
Logical Weapons
hysical Weapons
Summary
References

Chapter 5. Offensive Tactics and Procedures
Computer Network Exploitation
Computer Network Attack
Summary
References

Chapter 6. Psychological Weapons
Social Engineering Explained
How the Military Approaches Social Engineering
How the Military Defends against Social Engineering
Summary
References

Chapter 7. Defensive Tactics and Procedures
What We Protect
Security Awareness and Training
Defending Against Cyber Attacks
Summary
References

Chapter 8. Challenges We Face
Cybersecurity Issues defined
Interrelationship of Cybersecurity Issues
Way Ahead
Summary
References

Chapter 9. Where is Cyber Warfare Headed?
Technology-Based Trends
Policy-Based Trends
How to Defend in Today’s Contested Virtual Environment
Summary
References

Index


Availability
#
Perpustakaan Poltek SSN (Rak 300) 355.4 WIN b
b0001334
Available - Available
Detail Information
Series Title
--
Call Number
355.4 WIN b
Publisher
Massachusetts : Syngress., 2013
Collation
x, 150 hal.; ilus.; 24 cm
Language
English
ISBN/ISSN
9780124047372
Classification
355.4
Content Type
-
Media Type
-
Carrier Type
-
Edition
1st edition
Subject(s)
Computer networks -- Security measures
Information warfare
Specific Detail Info
--
Statement of Responsibility
Steve Winterfield dan Jason Andres
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?