Table of Contents Acknowledgments Foreword Why a Book on Cyber Warfare Is Important Why Should You Read This Book Introduction Abstract Book Overview and Key Learning Points Book Audience How this Book is Organized Conclusion Chapter 1. What is Cyber Warfare? Abstract Information in This Chapter What is Cyber Warfare? Have We Seen a Cyber War? Why Cyber Warfare Is Import…
Table of Contents Chapter 1. Cyber Threatscape How Did We Get Here? Attack Methodology Plus Tools/Techniques Used Attackers (The Types of Threats) How Most Organizations Defend Today (Defensive Mountain Range)? Targeted Capabilities (What We Should be Defending) Summary References Chapter 2. Cyberspace Battlefield Operations What is Cyber Warfare? Cyber War—Hype or Reality Bou…
Table of Contents I. TCP/IP. 1. IP Concepts. 2. Introduction to TCPdump and TCP. 3. Fragmentation. 4. ICMP. 5. Stimulus and Response. 6. DNS. II. TRAFFIC ANALYSIS. 7. Packet Dissection Using TCPdump. 8. Examining IP Header Fields. 9. Examining Embedded Protocol Header Fields. 10. Real-World Analysis. 11. Mystery Traffic. III. FILTERS/RULES FOR NETWORK MONITORING. 12. Writing …
Table of contents: Cyber as Deterrent Cybersecurity and Cyber Weapons: Is Nonproliferation Possible? Cyber Security for Nuclear Power Plants Cyber Security for Chemical Plants From Fortress to Resilience Cyber Security and Resilience of Industrial Control Systems and Critical Infrastructures
--
Table of contents: 0. Back to basics Building a foundation Demystifying IT security Using a risk based approach General security concepts Security maturity levels Section one: Protect Endpoint protection Network protection User awareness and education Section two: Detect Continous monitoring Network activity Vulnerability scanning Cyber intelligence …
Contents Chapter 1 What is information security Chapter 2 Identification and authentication Chapter 3 Authorization and access control Chapter 4 Auditing and accountability Chapter 5 Cryptography Chapter 6 Laws and regulations Chapter 7 Operatins security Chapter 8 Human element security Chapter 9 Physical security Chapter 10 Network security Chapter 11 Operating system security C…
Table of contents: Preface Part I. Getting Started The Rationale Collecting Traffic Part II. Security Onion Deployment Standalone Deployment Distributed Deployment Housekeeping Part III. Tools Command Line Packet Analysis Tools Graphical Packet Analysis Tools Consoles Part III. NSM in Action Collection, Analysis, Escalation, and Resolution Server-Side Compromise Client-Side Comp…