- Paperback: 326 pages
- Publisher: Syngress; 2 edition (16 July 2014)
- Language: English
- ISBN-10: 9780124166721
- ISBN-13: 978-0124166721
- ASIN: 0124166725
- Product Dimensions: 19 x 1.9 x 23.5 cm
- Boxed-product Weight: 567 g
- Average Customer Review: Be the first to review this item
- Amazon Bestsellers Rank: 43,417 in Books (See Top 100 in Books)
Other Sellers on Amazon
+ FREE Delivery
+ $11.48 Delivery
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners Paperback – 16 Jul 2014
|New from||Used from|
Customers who bought this item also bought
Customers who viewed this item also viewed
"Regardless of where the definition of cyber warfare finally settles, be it simply a war waged over the Internet, a technological cold war, network-based hostilities or simply another theater of war, there are without doubt activities that transpire over the wire that require much closer scrutiny not only by the security community but also by governments, businesses and the general public. The authors accurately and adeptly take the reader from the headlines to the front lines with frequent stops in underground communities, legislative halls and anywhere hackers (ethical or otherwise) are in high demand. This book serves as a report on the current cyber state of affairs on a global scale, as a career guide to those looking to enter this burgeoning field, and, most importantly, as a reference on protecting assets that are unmistakably in the field of battle...whether intended or not."--Donald C. Donzal, Editor-In-Chief, The Ethical Hacker Network
"A fifth domain of war has been added to land, air, sea and space: cyber. Malware capable of taking a nuclear program offline was science fiction 5 years ago: Stuxnet demonstrates that information security is now a matter of national security. This timely and necessary book provides an assessment of the current state of cyber warfare, and more importantly, where the conflict is heading. Highly recommended for information security professionals."--Eric Conrad, Lead Author, CISSP Study Guide, President, Backshore Communications
From the Back Cover
No customer reviews
|5 star (0%)|
|4 star (0%)|
|3 star (0%)|
|2 star (0%)|
|1 star (0%)|
Review this product
Most helpful customer reviews on Amazon.com
The grammar was actually pretty bad/confusing in places, and I sometimes found myself reading sentences multiple times to try to understand what the authors were attempting to convey. The summaries at the end of each chapter were also pretty useless. Instead of discussing the important information and facts to take away from each chapter (e.g., describing the most important cyber laws discussed, the relevant events, etc.), the authors gave a superficial list of the topics contained in the chapter, without details (e.g. "we talked about this, and this, and then this"), making the summaries pretty useless if you wanted a refresher on the important information contained within the chapter after you've read it. The glossary was also pretty sparse, making it difficult to go back and find specific information.
I like the book for several reasons:
1. It is inexpensive and compact.
2. It is very readable.
3. The material is well-organized.
4. It is *very* current.
5. It recounts numerous real-world events, giving specific information, to illustrate the concepts being presented.
6. It fills in technical background needed to understand the material without breaking the flow of the presentation.
7. It does not assume that the reader is a programmer or web developer; it is a book written for MIS people, SYSAdmins, Security folks (e.g., SISO's), and managers.
8. The material it presents is important and relevant to the modern security challenge.