Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}

Filter by

  • Publication Year
  • Availability
  • Attachment
  • Collection Type
    See More
  • General Material Designation
    See More
  • Location
    See More
  • Language
Found 7 from your keywords: subject="Information warfare"
cover
Information warfare and security
Comment Share
Denning, Dorothy E

This is a comprehensive and detailed view of information warfare. It presents methods, laws, and case examples stressing actual incidents to illustrate such instances. What individuals, corporations, and governments need to know about information-related attacks and defenses! Every day, we hear reports of hackers who have penetrated computer networks, vandalized Web pages, and accessed sensitiv…

Edition
-
ISBN/ISSN
0201433036
Collation
xvii, 522 hlm.; 22 cm
Series Title
-
Call Number
355.343 DEN i
Availability1
Add to basket
MARC DownloadCite
cover
Tallinn manual 2.0 on the international law applicable to cyber operations
Comment Share
Schmitt, Michael N.

Terdapat bibliografi dan indeks. Table of contents: Pt. I General international law and cyberspace 1.Sovereignty 2.Due diligence 3.Jurisdiction 4.Law of international responsibility 5.Cyber operations not per se regulated by international law Pt. II Specialised regimes of international law and cyberspace 6.International human rights law 7.Diplomatic and consular law 8.Law of the …

Edition
Second edition
ISBN/ISSN
9781316630372
Collation
xli, 598 hal.; ilus.; 24 cm
Series Title
--
Call Number
341.6 SCH t
Availability2
Add to basket
MARC DownloadCite
cover
Inside cyber warfare
Comment Share
Carr, Jeffrey

Terdapat indeks. Table of contents: 1. Assessing the Problem 2. The Rise of the Nonstate Hacker 3. The Legal Status of Cyber Warfare 4. Responding to International Cyber Attacks as Acts of War 5. The Intelligence Component to Cyber Warfare 6. Nonstate Hackers and the Social Web 7. Follow the Money 8. Organized Crime in Cyberspace 9. Investigating Attribution 10. Weaponizing Malware…

Edition
Second edition
ISBN/ISSN
9781449310042
Collation
xviii, 294 hal.; ilus.; 24 cm
Series Title
--
Call Number
363.25 CAR i
Availability1
Add to basket
MARC DownloadCite
cover
Cyber warfare: techniques, tactics and tools for security practitioners
Comment Share
Andress, JasonWinterfeld, Steve

Table of Contents Acknowledgments Foreword Why a Book on Cyber Warfare Is Important Why Should You Read This Book Introduction Abstract Book Overview and Key Learning Points Book Audience How this Book is Organized Conclusion Chapter 1. What is Cyber Warfare? Abstract Information in This Chapter What is Cyber Warfare? Have We Seen a Cyber War? Why Cyber Warfare Is Import…

Edition
Second Edition
ISBN/ISSN
9780124166721
Collation
xi, 306 hal.; ilus.; 23 cm
Series Title
--
Call Number
355.4 AND c
Availability1
Add to basket
MARC DownloadCite
cover
The basics of cyber warfare: understanding the fundamentals of cyber warfare …
Comment Share
Andress, JasonWinterfeld, Steve

Table of Contents Chapter 1. Cyber Threatscape How Did We Get Here? Attack Methodology Plus Tools/Techniques Used Attackers (The Types of Threats) How Most Organizations Defend Today (Defensive Mountain Range)? Targeted Capabilities (What We Should be Defending) Summary References Chapter 2. Cyberspace Battlefield Operations What is Cyber Warfare? Cyber War—Hype or Reality Bou…

Edition
1st edition
ISBN/ISSN
9780124047372
Collation
x, 150 hal.; ilus.; 24 cm
Series Title
--
Call Number
355.4 WIN b
Availability1
Add to basket
MARC DownloadCite
cover
Introduction to cyber-warfare: a multidisciplinary approach
Comment Share
Shakarian, PauloShakarian, JanaRuef, Andrew

Table of Contents Chapter 1. Cyber Warfare: Here and Now What Is Cyber War? Is Cyber War a Credible Threat? Attribution, Deception, and Intelligence Information Assurance I: Cyber Attack Chapter 2. Political Cyber Attack Comes of Age in 2007 Information in this Chapter Reliance on Information as a Vulnerability Rudimentary but Effective: Denial of Service Leaving Unwanted Messa…

Edition
1st edition
ISBN/ISSN
9780124078147
Collation
xvii, 318 hal.; ilus.; 24 cm
Series Title
--
Call Number
355.4 SHA i
Availability1
Add to basket
MARC DownloadCite
cover
Cyberwar: law and ethics for virtual conflicts
Comment Share
Ohlin, Jeens DavidGovern, KevinFinkelstein, Claire

Part I FOUNDATIONAL QUESTIONS OF CYBERWAR 1.The Nature of War and the Idea of "Cyberwar" /​ Larry May 2.Is There Anything Morally Special about Cyberwar? /​ James L Cook 3.Cyber Causation /​ Jens David Ohlin Part II CONCEPTUALIZING CYBER ATTACKS: THE CIVIL-MILITARY DIVIDE 4.Cyberterrorism and Enemy Criminal Law /​ Stuart Macdonald 5.Cyberwar versus Cyber Attack: The Role of Rhet…

Edition
--
ISBN/ISSN
9780198717508
Collation
xxxii, 274 hal.; 25 cm.
Series Title
--
Call Number
341.6 OHL c
Availability1
Add to basket
MARC DownloadCite
Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?