[www.ed2k.online]下載基地為您提供軟件、遊戲、圖書、教育等各種資源的ED2K電驢共享下載和MAGNET磁力鏈接下載。
設為首頁
加入收藏
首頁 圖書資源 軟件資源 游戲資源 教育資源 其他資源
 電驢下載基地 >> 图书资源 >> 計算機與網絡 >> 《網絡戰內幕》(Inside Cyber Warfare: Mapping the Cyber Underworld)英文文字版/EPUB/更新第二版[PDF]
《網絡戰內幕》(Inside Cyber Warfare: Mapping the Cyber Underworld)英文文字版/EPUB/更新第二版[PDF]
下載分級 图书资源
資源類別 計算機與網絡
發布時間 2017/7/11
大       小 -
《網絡戰內幕》(Inside Cyber Warfare: Mapping the Cyber Underworld)英文文字版/EPUB/更新第二版[PDF] 簡介: 中文名 : 網絡戰內幕 原名 : Inside Cyber Warfare: Mapping the Cyber Underworld 作者 : Jeffrey Carr 圖書分類 : 軟件 資源格式 : PDF 版本 : 英文文字版/EPUB/更新第二版 出版社 : O'Reilly 書號 : 978-0-596-80215-8 發行時間 : 2009年12月 地區 :
電驢資源下載/磁力鏈接資源下載:
全選
"《網絡戰內幕》(Inside Cyber Warfare: Mapping the Cyber Underworld)英文文字版/EPUB/更新第二版[PDF]"介紹
中文名: 網絡戰內幕
原名: Inside Cyber Warfare: Mapping the Cyber Underworld
作者: Jeffrey Carr
圖書分類: 軟件
資源格式: PDF
版本: 英文文字版/EPUB/更新第二版
出版社: O'Reilly
書號: 978-0-596-80215-8
發行時間: 2009年12月
地區: 美國
語言: 英文
簡介:


內容介紹:
You may have heard about "cyber warfare" in the news, but do you really know what it is? This book provides fascinating and disturbing details on how nations, groups, and individuals throughout the world are using the Internet as an attack platform to gain military, political, and economic advantages over their adversaries. You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.
Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.
Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and Palestine
Discover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nations
Read about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survival
Find out why many attacks originate from servers in the United States, and who's responsible
Learn how hackers are "weaponizing" malware to attack vulnerabilities at the application level
內容截圖:

目錄:
Chapter 1 Assessing the Problem
Chapter 2 The Rise of the Non-State Hacker
Chapter 3 The Legal Status of Cyber Warfare
Chapter 4 Responding to International Cyber Attacks As Acts of War
Chapter 5 The Intelligence Component to Cyber Warfare
Chapter 6 Non-State Hackers and the Social Web
Chapter 7 Follow the Money
Chapter 8 Organized Crime in Cyberspace
Chapter 9 Investigating Attribution
Chapter 10 Weaponizing Malware
Chapter 11 The Role of Cyber in Military Doctrine
Chapter 12 A Cyber Early Warning Model
Chapter 13 Advice for Policy Makers from the Field 
相關資源:

免責聲明:本網站內容收集於互聯網,本站不承擔任何由於內容的合法性及健康性所引起的爭議和法律責任。如果侵犯了你的權益,請通知我們,我們會及時刪除相關內容,謝謝合作! 聯系信箱:[email protected]

Copyright © 電驢下載基地 All Rights Reserved