reklama - zainteresowany?

Inside Cyber Warfare. 3rd Edition - Helion

Inside Cyber Warfare. 3rd Edition
ebook
Autor: Jeffrey Caruso
ISBN: 9781098138479
stron: 160, Format: ebook
Data wydania: 2024-09-16
Księgarnia: Helion

Cena książki: 160,65 zł (poprzednio: 198,33 zł)
Oszczędzasz: 19% (-37,68 zł)

Dodaj do koszyka Inside Cyber Warfare. 3rd Edition

Get a fascinating and disturbing look into how state and nonstate actors throughout the world use cyber attacks to gain military, political, and economic advantages. In the third edition of this book, cyber warfare researcher Jeffrey Caruso explores the latest advances in cyber espionage and warfare that have emerged on the battlefields of Ukraine and the Middle East, including cyber attacks that result in the physical destruction of the target and the pairing of cognitive with maneuver warfare.

Inside Cyber Warfare features an exclusive deep dive into the wartime operations of an offensive cyber unit of Ukraine's Ministry of Defense as it works to defend the nation against Russian forces, particularly since the 2022 invasion:

  • See what happened when a Ukrainian cyber and special operations team worked together to destroy a secret missile laboratory
  • Explore the legal status of cyber warfare and civilian hackers
  • Discover how a cyber team with little money and limited resources learned to create fire from the manipulation of code in automated systems
  • Distinguish reality from fiction regarding AI safety and existential risk
  • Learn new strategies for keeping you and your loved ones safe in an increasingly complex and insecure world

Dodaj do koszyka Inside Cyber Warfare. 3rd Edition

 

Osoby które kupowały "Inside Cyber Warfare. 3rd Edition", wybierały także:

  • Biologika Sukcesji Pokoleniowej. Sezon 2. Za
  • Biologika Sukcesji Pokoleniowej. Sezon I.
  • Windows Media Center. Domowe centrum rozrywki
  • PodrÄ™cznik startupu. Budowa wielkiej firmy krok po kroku
  • Ruby on Rails. Ćwiczenia

Dodaj do koszyka Inside Cyber Warfare. 3rd Edition

Spis treści

Inside Cyber Warfare. 3rd Edition eBook -- spis treści

  • Foreword
  • Preface
    • Conventions Used in This Book
    • OReilly Online Learning
    • How to Contact Us
    • Acknowledgments
  • 1. How Did We Get Here?
    • von Neumanns Monster
    • Is Software Killing People?
    • To Disclose, or Not to Disclose, or to Responsibly Disclose
      • Sony PlayStation Network
      • Equifax
      • Twitter
    • Problematic Reporting of Exploits and Vulnerabilities
    • The Exploit Database
    • A Protection Racket?
    • Summary
  • 2. Who Did It?
    • Attribution Is Inferred, Not Deduced
    • Examining Our Assumptions
      • The Exclusive Use Assumption
      • The Working-Hours Assumption
      • The Criminals Versus Spies Assumption
      • Valid Concerns
    • The Need for Independent Fact-Finding
    • A Proposed International Attribution Mechanism Modeled after the OPCW
    • Summary
  • 3. Establishing Corporate Accountability
    • Pay for Protection
    • It All Comes Down to Cost Calculation
      • The Railroad
      • Shipping
      • Automobiles
      • Software
    • The Move to Software Regulation
      • As Is
      • Independent Testing
    • The National Cybersecurity Strategy
    • Summary
  • 4. The Legal Status of Cyber Warfare
    • Ukraines Call to Arms for Hackers
    • Rules Related to Cyber Attacks
      • The International Committee of the Red Cross
      • The International Criminal Court
      • Cyber Attacks against Civilians During Wartime
      • Incitement to Genocide
    • Legal Review of Cyber Weapons
    • The Civilian Hacker Targeting Matrix
      • A Decision Tree for the Legal Targeting of Combatants and Civilians
    • Case Studies
      • Junaid Hussain
      • The Anonymous War on ISIS
      • The Ukraine Power Grid Attack
    • Summary
  • 5. The New Enmeshed War Strategy
    • Cognitive Warfare and Operations in the Information Environment
    • A Central Figure: Yevgeny Prigozhin
      • The Wagner Group
      • The Internet Research Agency
    • Case Study #1: Ukraine
      • The Wagner Groups Campaign
      • The Internet Research Agencys Campaign
    • Case Study #2: Syria
      • The Wagner Groups Campaign
      • The Internet Research Agencys Campaign
    • Case Study #3: Mali
      • The Wagner Groups Campaign
      • The Internet Research Agencys Campaign
    • Platforms for Disinformation and Misinformation 
      • X
      • TikTok
    • Using Social Media for Surveillance
      • F3EAD
      • Benign Surveillance (Not) and Real-Time Bidding
    • Best Practices
      • Disinformation and Misinformation
      • Cyber Warfare
    • Summary
  • 6. Cyber Attacks with Kinetic Effects
    • We Can Only Measure Whats Been Discovered
    • Attacking Operational Technology
      • The Aurora Generator Test
      • Iran Centrifuge Assembly Center 
      • Underground Fuel Enrichment Plant
      • Gazprom
      • Gazprom Sartransneftegaz Pipeline
      • Gazprom Urengoy Center 2 Pipeline
      • Gazprom Urengoy Pipeline
      • Second Central Research Institute of the Ministry of Defense of the Russian Federation
      • Khouzestan Steel Company 
      • Evaluating the Effectiveness of Sabotage
    • Defending Against Cyber/Physical Attacks
    • Summary
  • 7. AI
    • Defining Terms
      • Generative AI
      • Neural Network
      • Narrow AI
      • Foundation Model
      • Frontier AI
      • Artificial General Intelligence
      • Superintelligence
    • Present Risks
      • Cybersecurity Vulnerabilities
        • Indirect prompt injection
        • Automated vulnerability exploitation
        • Network attacks
      • Automated Decision Making
      • Warfighting
        • Disinformation (aka cognitive warfare)
        • AI-guided drone swarms
    • Speculative Risks
      • Self-Preservation
      • The Treacherous Turn
      • The Sharp Left Turn
    • Risk Versus Probability
      • The Zero-Probability High-Impact Risk Model
    • Regulation
    • Summary
      • Risk
      • Regulation
      • Influence
  • Afterword
    • Reduce Your Attack Surface
    • Create Redundancies for Your Critical Systems
    • Diversify Your Risks
  • Index

Dodaj do koszyka Inside Cyber Warfare. 3rd Edition

Code, Publish & WebDesing by CATALIST.com.pl



(c) 2005-2024 CATALIST agencja interaktywna, znaki firmowe należą do wydawnictwa Helion S.A.