51,65 €
57,39 €
-10% with code: EXTRA
Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency
Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency
51,65
57,39 €
  • We will send in 10–14 business days.
"Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency" is one of the few books that covers destructive Computer Network Attacks in the Internet and in CyberSpace. It is an in-depth reference that covers DDOS from motivation, identification, analysis and mitigation. By the author of the consistently top-selling in class "How to Cheat at Managing Information Security" and like that book, proceeds go to charity. Osborne starts with Network/Internet provider business practices and existing mon…
57.39
  • SAVE -10% with code: EXTRA

Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency (e-book) (used book) | bookbook.eu

Reviews

(5.00 Goodreads rating)

Description

"Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency" is one of the few books that covers destructive Computer Network Attacks in the Internet and in CyberSpace. It is an in-depth reference that covers DDOS from motivation, identification, analysis and mitigation.

By the author of the consistently top-selling in class "How to Cheat at Managing Information Security" and like that book, proceeds go to charity. Osborne starts with Network/Internet provider business practices and existing monitoring & detection systems. It shows the current focus on other forms of attacks including traditional electronic espionage, counter-terrorism and malware. It then describes various mechanisms for estimation of Cyberattack impact covering direct cost, indirect cost, and customer churn.

It gradually drills down covering the various attacks types - right down to the packet trace level, and how to detect them. These chapters are culminated with a full description of mitigation techniques, traditional and cutting edge - again these are described in clear English but reinforced with common device configuration for the technical reader.

The penultimate section highlights details of vulnerabilities in the Physical, Human, Mobile Apps, SCADA, Software security, BGP, and DNS elements of Cybersecurity. These include those that are currently utilised, that were predicted and have since been exploited during the publication process, and those that have yet to be leveraged.

The last chapter explores the concept of a Firesale and how Hollywood's blueprint for Armageddon could be implemented in reality.

EXTRA 10 % discount with code: EXTRA

51,65
57,39 €
We will send in 10–14 business days.

The promotion ends in 23d.03:24:27

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 0,57 Book Euros!?

"Cyber Attack, CyberCrime, CyberWarfare - CyberComplacency" is one of the few books that covers destructive Computer Network Attacks in the Internet and in CyberSpace. It is an in-depth reference that covers DDOS from motivation, identification, analysis and mitigation.

By the author of the consistently top-selling in class "How to Cheat at Managing Information Security" and like that book, proceeds go to charity. Osborne starts with Network/Internet provider business practices and existing monitoring & detection systems. It shows the current focus on other forms of attacks including traditional electronic espionage, counter-terrorism and malware. It then describes various mechanisms for estimation of Cyberattack impact covering direct cost, indirect cost, and customer churn.

It gradually drills down covering the various attacks types - right down to the packet trace level, and how to detect them. These chapters are culminated with a full description of mitigation techniques, traditional and cutting edge - again these are described in clear English but reinforced with common device configuration for the technical reader.

The penultimate section highlights details of vulnerabilities in the Physical, Human, Mobile Apps, SCADA, Software security, BGP, and DNS elements of Cybersecurity. These include those that are currently utilised, that were predicted and have since been exploited during the publication process, and those that have yet to be leveraged.

The last chapter explores the concept of a Firesale and how Hollywood's blueprint for Armageddon could be implemented in reality.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)