Table of Contents Prologue Introduction Chapter 1: How Did We Get Here? Chapter 2: Motives & Targets: Manipulation in a Post-Truth, Post-Trust Era Chapter 3: How Do You Know What You Think You Know? Chapter 4: The Manipulators and Their Methods Chapter 5: Hackers in the Trenches Chapter 6: Exclusive Interview: Anatomy of a Manipulation Campaign Chapter 7: The U.S. Elections 2…
Fundamentally changes the way we think about cyber operations from ‘war’ to something of significant import that is not war―what Buchanan refers to as ‘real geopolitical competition.’” Cyber attacks are less destructive than we thought they would be―but they are more pervasive, and much harder to prevent. With little fanfare and only occasional scrutiny, they target our banks, ou…
Table of Contents Foreword xxiii Introduction xxv Chapter 1 Understanding the Bigger Picture 1 Chapter 2 Building a Cybersecurity Incident Response Team 51 Chapter 3 Technology Considerations in Cyber Breach Investigations 97 Chapter 4 Crafting an Incident Response Plan 143 Chapter 5 Investigating and Remediating Cyber Breaches 195 Chapter 6 Legal and Regulatory Considerations in Cy…
Table of Contents Chapter 1. What is cyber safety? Abstract What Is Cyber Safety? Paying Attention to What’s Out There Privacy Encryption Monitoring Online Activity Identifying the Devices You Use, and Where You Use Them Using Different Windows Accounts Physical Security Summary Further …
Table of Contents Biography Chapter 1: Introduction Abstract Chapter 2: Metrics, similarity, and sets Abstract 2.1 Introduction to Set Theory 2.2 Operations on Sets 2.3 Set Theory Laws 2.4 Functions 2.5 Metrics 2.6 Distance Variations 2.7 Similarities 2.8 Metrics and Similarities of Number…
Table of Contents Dedication About the Authors Acknowledgments Introduction Chapter 1: Digital Reconnaissance and Surveillance Abstract Digital reconnaissance and surveillance Threat of digital reconnaissance and surveillance Why spy? Who spies? Legal and ethical principles Summary Chapter 2: Informa…
Table of contents: 1. Metrics, statistical quality control and basic reliability in cyber-risk 2. Complex network reliability evaluation and estimation in cyber-risk 3. Stopping rules for reliability and security tests in cyber-risk 4. Security assessment and management in cyber-risk 5. Game-theoretic computing in cyber-risk 6. Modeling and simulation in cyber-risk 7. Cloud computing in …