Inside cyber warfare / Jeffrey Carr.

By: Carr, JeffreyMaterial type: TextTextPublisher: Cambridge : O'Reilly, 2012Edition: 2nd edDescription: xviii, 294 p. : ill., maps ; 24 cmISBN: 9781449310042 Subject(s): Computer crimes | Cyberterrorism | Information warfare | TerrorismLOC classification: HV6773.C345 (2e)
Contents:
Contents: Assessing the problem -- The rise of the nonstate hacker -- The legal status of cyber warfare -- Responding to international cyber attacks as acts of war -- The intelligence component to cyber warfare -- Nonstate hackers and social web -- Follow the money -- Organized crime in cyberspace -- Investigating attribution -- Weaponizing malware -- The role of cyber in military doctrine -- A cyber early warning model -- Advice for policymakers from the field -- Conducting operations in the cyber-space-time continuum -- The Russian Federation: information warfare framework -- Cyber warfare capabilities by nation-state -- US department of defense cyber command and organizational structure -- Active defense for cyber: a legal framework for covert countermeasures.
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Item type Current location Home library Call number Copy number Status Date due Barcode
Books Books WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY
Reference
WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY
HV6773.C345(2e) (Browse shelf) 1 Available 9170/619/22
Browsing WISCONSIN INTERNATIONAL UNIVERSITY COLLEGE, GHANA - MAIN LIBRARY shelves, Shelving location: Reference Close shelf browser

"Mapping the cyber underworld"--Cover.

Includes bibliographical references and index.

Contents: Assessing the problem -- The rise of the nonstate hacker -- The legal status of cyber warfare -- Responding to international cyber attacks as acts of war -- The intelligence component to cyber warfare -- Nonstate hackers and social web -- Follow the money -- Organized crime in cyberspace -- Investigating attribution -- Weaponizing malware -- The role of cyber in military doctrine -- A cyber early warning model -- Advice for policymakers from the field -- Conducting operations in the cyber-space-time continuum -- The Russian Federation: information warfare framework -- Cyber warfare capabilities by nation-state -- US department of defense cyber command and organizational structure -- Active defense for cyber: a legal framework for covert countermeasures.

There are no comments on this title.

to post a comment.

If you have any concerns or questions; kindly contact the library


© Powered by WIUC IT - Support Services Unit