Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. Surviving Cyberwar examines in depth the major recent cyber attacks that have taken place in the United States and around the world including a discussion of the 2016 election. This book discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. Through investigations of the most significant and damaging cyber attacks, the author introduces the reader to cyberwar, outlines an…mehr
Every day, thousands of attempts are made to hack into America's critical infrastructure. These attacks, if successful, could have devastating consequences. Surviving Cyberwar examines in depth the major recent cyber attacks that have taken place in the United States and around the world including a discussion of the 2016 election. This book discusses the implications of such attacks, and offers solutions to the vulnerabilities that made these attacks possible. Through investigations of the most significant and damaging cyber attacks, the author introduces the reader to cyberwar, outlines an effective defense against cyber threats, and explains how to prepare for future attacks. This text is a stimulating and informative look at one of the gravest threats to Homeland Security today, offering new insights to technologists on the front lines, helping policy makers understand the challenges they face, and providing guidance for every organization to help reduce exposure to cyber threats. It is essential reading for anyone concerned with the current geopolitical state of affairs.
Richard Stiennon, security expert and industry analyst, is known for shaking up the industry and providing actionable guidance to vendors and end users. He is currently Chief Strategy Officer for Blancco Technology Group, a London listed company specializing in data erasure products. He is also the Director of the International Data Sanitization Consortium and sits on the electronic waste standard, R2¿s, board of advisors. He was Chief Marketing Officer for Fortinet, Inc. the leading UTM vendor. Prior to that he was VP Threat Research at Webroot Software where he followed and wrote about the rising tide of spyware. Before Webroot, Mr. Stiennon was VP Research at Gartner Inc. where he covered security topics including firewalls, intrusion detection, intrusion prevention, security consulting, and managed security services for the Security and Privacy group. He is a holder of Gartner's Thought Leadership award and was named "One of the 50 most powerful people in Networking" by NetworkWorld Magazine. In November 2009, he was named by SC Magazine as a security industry pioneer. Mr. Stiennon has presented in 28 countries on six continents. His speaking engagements have included: Mr. Stiennon has written for Network World (IDG) and CIOUpdate (Jupiter Media) Mr. Stiennon earned a B.S. in Aerospace Engineering from the University of Michigan, and an MA in War in the modern World from King¿s College, London. He holds two patents.
Inhaltsangabe
Table of Contents Chapter 1 Titan Rain Chapter 2 Chinese Thinking Chapter 3 Cyber Espionage Chapter 4 Toppling email servers Chapter 5 China vs the Pentagon Chapter 6 Russia vs the Pentagon Chapter 7 Formation of US Cyber Command Chapter 8 Geo-political cyber hotspots Chapter 9 DDOS As Weapon of War Chapter 10 Crowd sourced cyber attacks Chapter 11 Estonia Chapter 12 Georgia Chapter 13 Ukraine Chapter 14 Montenegro Chapter 15 Big Data, Facebook and Brexit Chapter 16 Information warfare and the 2016 US Elections Chapter 12 Historical Perspective Chapter 13 Four Pillars of cyber defense Chapter 14 Preparedness Chapter 15 Repercussions
Table of Contents Chapter 1 Titan Rain Chapter 2 Chinese Thinking Chapter 3 Cyber Espionage Chapter 4 Toppling email servers Chapter 5 China vs the Pentagon Chapter 6 Russia vs the Pentagon Chapter 7 Formation of US Cyber Command Chapter 8 Geo-political cyber hotspots Chapter 9 DDOS As Weapon of War Chapter 10 Crowd sourced cyber attacks Chapter 11 Estonia Chapter 12 Georgia Chapter 13 Ukraine Chapter 14 Montenegro Chapter 15 Big Data, Facebook and Brexit Chapter 16 Information warfare and the 2016 US Elections Chapter 12 Historical Perspective Chapter 13 Four Pillars of cyber defense Chapter 14 Preparedness Chapter 15 Repercussions
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Shop der buecher.de GmbH & Co. KG Bürgermeister-Wegele-Str. 12, 86167 Augsburg Amtsgericht Augsburg HRA 13309