Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. T...

Buy Now From Amazon

Product Review

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.

This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed.

This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.

  • Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
  • Dives deeply into relevant technical and factual information from an insider's point of view
  • Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result


Similar Products

Cyberpower and National SecurityTargeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and MalwareCyber War: The Next Threat to National Security and What to Do About ItCybersecurity and Cyberwar: What Everyone Needs to Know®The Basics of Information Security, Second Edition: Understanding the Fundamentals of InfoSec in Theory and PracticeData Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network ProtocolsBlue Team Field Manual (BTFM) (RTFM)The Hacker Playbook 2: Practical Guide To Penetration TestingThe Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made EasyRtfm: Red Team Field Manual