BU Library and Learning Space
Local cover image
Local cover image
Amazon cover image
Image from Amazon.com

Cyberwarefare : an introduction to information-age conflict / Issac R. Porche III

By: Material type: TextTextSeries: Artech House Intelligence and Information Operations SeriesPublisher: Boston : Artech House, 2020Description: 1 online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781630815769
  • 9781630815783
Subject(s): LOC classification:
  • HV6773.15.C97 P672C 2020
Online resources: Summary: Conflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. As a result, knowledge of the topic is becoming essential across most disciplines. This book reviews and explains the technologies that underlie offensive and defensive cyber operations, which are practiced by a range of cyber actors including state actors, criminal enterprises, activists, and individuals. It explains the processes and technologies that enable the full spectrum of cyber operations. Readers will learn how to use basic tools for cyber security and pen-testing, and also be able to quantitatively assess cyber risk to systems and environments and discern and categorize malicious activity. The book provides key concepts of information age conflict technical basics/fundamentals needed to understand more specific remedies and activities associated with all aspects of cyber operations. It explains techniques associated with offensive cyber operations, with careful distinctions made between cyber ISR, cyber exploitation, and cyber attack. It explores defensive cyber operations and includes case studies that provide practical information, making this book useful for both novice and advanced information warfare practitioners.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Includes bibliographical references and index.

Conflict in cyberspace is becoming more prevalent in all public and private sectors and is of concern on many levels. As a result, knowledge of the topic is becoming essential across most disciplines. This book reviews and explains the technologies that underlie offensive and defensive cyber operations, which are practiced by a range of cyber actors including state actors, criminal enterprises, activists, and individuals. It explains the processes and technologies that enable the full spectrum of cyber operations. Readers will learn how to use basic tools for cyber security and pen-testing, and also be able to quantitatively assess cyber risk to systems and environments and discern and categorize malicious activity. The book provides key concepts of information age conflict technical basics/fundamentals needed to understand more specific remedies and activities associated with all aspects of cyber operations. It explains techniques associated with offensive cyber operations, with careful distinctions made between cyber ISR, cyber exploitation, and cyber attack. It explores defensive cyber operations and includes case studies that provide practical information, making this book useful for both novice and advanced information warfare practitioners.

There are no comments on this title.

to post a comment.

Click on an image to view it in the image viewer

Local cover image

Library Opening Hours

Mon. - Sat. : 8:30 - 20:00

Public Holidays : Closed

Sun. : Closed

Contact Us

9/1 Moo 5, Surat Osathanugrah Library (Building C6), Phaholyothin Road, Klong Nueng, Klong Luang, Pathumthani 12120

Phone : 02-407-3888 ext. 2701

E-mail : library@bu.ac.th