Catálogo de publicaciones

Compartir en
redes sociales


Navegación

Tipo

Acceso

Plataformas

Temática

Mostrando 10 de 21.911 registro(s)

Filtros temática quitar todos

Cyber Attacks: Protecting National Infrastructure

Más información

978-0-12-384917-5 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2011 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Medicina básica  

No nation – especially the United States – has a coherent technical and architectural strategy for preventing cyber attack from crippling essential critical infrastructure services. This book initiates an intelligent national (and international) dialogue amongst the general technical community around proper methods for reducing national risk. This includes controversial themes such as the deliberate use of deception to trap intruders. It also serves as an attractive framework for a new national strategy for cyber security, something that several Presidential administrations have failed in attempting to create. In addition, nations other than the US might choose to adopt the framework as well Amoroso offers a technical, architectural, and management solution to the problem of protecting national infrastructure. This includes practical and empirically-based guidance for security engineers, network operators, software designers, technology managers, application developers, and even those who simply use computing technology in their work or home. Each principle is presented as a separate security strategy, along with pages of compelling examples that demonstrate use of the principle. A specific set of criteria requirements allows any organization, such as a government agency, to integrate the principles into their local environment. This book takes the national debate on protecting critical infrastructure in an entirely new and fruitful direction.

* Covers cyber security policy development for massively complex infrastructure using ten principles derived from experiences in U.S. Federal Government settings and a range of global commercial environments. * Provides a unique and provocative philosophy of cyber security that directly contradicts conventional wisdom about info sec for small or enterprise-level systems. * Illustrates the use of practical, trial-and-error findings derived from 25 years of hands-on experience protecting critical infrastructure on a daily basis at AT&T.


Cyber Crime and Cyber Terrorism Investigator's Handbook

Más información

978-0-12-800743-3 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2014 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ingeniería eléctrica, electrónica e informática - Ingeniería mecánica - Derecho - Ciencia política  

Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today’s security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become.

Cyber Crime and Cyber Terrorism Investigator’s Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare.

Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator’s Handbook will serve as your best reference to the modern world of cyber crime.

  • Written by experts in cyber crime, digital investigations, and counter-terrorism
  • Learn the motivations, tools, and tactics used by cyber-attackers, computer security professionals, and investigators
  • Keep up to date on current national and international law regarding cyber crime and cyber terrorism
  • See just how significant cyber crime has become, and how important cyber law enforcement is in the modern world

Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors

Más información

978-1-59749-133-4 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2007 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ingeniería mecánica - Ciencias sociales  

Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.

The book begins with the chapter “What is Cyber Crime?” This introductory chapter describes the most common challenges faced by cyber investigators today. The following chapters discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. Issues relating to cyber crime definitions, the electronic crime scene, computer forensics, and preparing and presenting a cyber crime investigation in court will be examined. Not only will these topics be generally be discussed and explained for the novice, but the hard questions —the questions that have the power to divide this community— will also be examined in a comprehensive and thoughtful manner.

This book will serve as a foundational text for the cyber crime community to begin to move past current difficulties into its next evolution.

* This book has been written by a retired NYPD cyber cop, who has worked many high-profile computer crime cases

* Discusses the complex relationship between the public and private sector with regards to cyber crime

* Provides essential information for IT security professionals and first responders on maintaining chain of evidence

Cyber Guerilla

Más información

978-0-12-805197-9 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2016 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias biológicas - Ciencias agrícolas y veterinarias  

Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape.

Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors’ own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.

  • Discusses the conceptual and ideological foundation of hackers and hacker groups
  • Provides concrete footholds regarding hacker group strategy
  • Discusses how cyber guerillas are changing the face of cyber warfare and cyber security through asymmetrical, flexible and stealthy means and methods
  • Explains the tactics, techniques, and procedures these hacker groups use in their operations
  • Describes how cyber guerrillas and hackers use the media and influence the public
  • Serves as a must-have guide for anyone who wants to understand—or is responsible for defending against—cyber warfare attacks

Cyber Reconnaissance, Surveillance and Defense

Más información

978-0-12-801308-3 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No detectada 2015 ScienceDirect

Cobertura temática: Ciencias de la computación e información - Ciencias de la salud  

At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them.

Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes many new and leading-edge surveillance, information-gathering, and personal exploitation threats taking place today, including Web cam breaches, home privacy systems, physical and logical tracking, phone tracking, picture metadata, physical device tracking and geo-location, social media security, identity theft, social engineering, sniffing, and more.

  • Understand how IT surveillance and reconnaissance techniques are being used to track and monitor activities of individuals and organizations
  • Find out about the legal basis of these attacks and threats — what is legal and what is not — and how to defend against any type of surveillance
  • Learn how to thwart monitoring and surveillance threats with practical tools and techniques
  • Real-world examples teach using key concepts from cases in the news around the world

libros Acceso Abierto
Agregar a Mi catálogo

Cyber Security

Más información

ISBNs: 978-981-13-6620-8 (impreso) 978-981-13-6621-5 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere 2019 SpringerLink acceso abierto

Cobertura temática: Ciencias de la computación e información  


libros Acceso Abierto
Agregar a Mi catálogo

Cyber Security

Más información

ISBNs: 978-981-33-4921-6 (impreso) 978-981-33-4922-3 (en línea)

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere 2020 SpringerLink acceso abierto

Cobertura temática: Ciencias de la computación e información  


libros Acceso Abierto
Agregar a Mi catálogo

Cyber Security: 15th International Annual Conference, CNCERT 2018, Beijing, China, August 14–16, 2018, Revised Selected Papers

Más información

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere Directory of Open access Books acceso abierto

Cobertura temática: Ciencias de la computación e información  


libros Acceso Abierto
Agregar a Mi catálogo

Cyber Security: 18th China Annual Conference, CNCERT 2021, Beijing, China, July 20–21, 2021, Revised Selected Papers

Más información

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere Directory of Open access Books acceso abierto

Cobertura temática: Ciencias de la computación e información - Ingeniería eléctrica, electrónica e informática - Medios de comunicación  


libros Acceso Abierto
Agregar a Mi catálogo

Cyber Security: 17th China Annual Conference, CNCERT 2020, Beijing, China, August 12, 2020, Revised Selected Papers

Más información

Disponibilidad
Institución detectada Año de publicación Navegá Descargá Solicitá
No requiere Directory of Open access Books acceso abierto

Cobertura temática: Ciencias de la computación e información - Ingeniería eléctrica, electrónica e informática - Medios de comunicación