Cyber operations: A case study approach
Material type:
TextLanguage: English Publication details: New Jersey: Wiley Data and Cybersecurity, 2024. Edition: 1st edDescription: xvi, 304pISBN: 9781119712107Subject(s): Cyber Operations Introduction | ISIS and Web‐Based Insurgency | DPRK Cyber OperationsDDC classification: 005.8 Online resources: Click here to access online
| Item type | Current library | Call number | Status | Date due | Barcode |
|---|---|---|---|---|---|
| e-Books | Dr. S. R. Ranganathan Library Ebook (Online Access) | 005.8 (Online Access) (Browse shelf(Opens below)) | Available | EB0094 |
Browsing Dr. S. R. Ranganathan Library shelves, Shelving location: Ebook (Online Access) Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| 005.8 (Online Access) Cryptography, information theory, and error-correction: A handbook for the 21st century | 005.8 (Online Access) Cyber breach response that actually works: organizational approach to managing residual risk | 005.8 (Online Access) Cyber mayday and the day after: A leader's guide to preparing, managing, and recovering from inevitable business disruptions | 005.8 (Online Access) Cyber operations: A case study approach | 005.8 (Online Access) Cyber security and network security | 005.8 (Online Access) Cyber-vigilance and digital trust: cyber security in the era of cloud computing and IoT | 005.8 (Online Access) Cybersecurity blue team toolkit |
Cyber Operations
A rigorous new framework for understanding the world of the future
Information technology is evolving at a truly revolutionary pace, creating with every passing year a more connected world with an ever-expanding digital footprint. Cyber technologies like voice-activated search, automated transport, and the Internet of Things are only broadening the interface between the personal and the online, which creates new challenges and new opportunities. Improving both user security and quality of life demands a rigorous, farsighted approach to cyber operations.
Cyber Operations offers a groundbreaking contribution to this effort, departing from earlier works to offer a comprehensive, structured framework for analyzing cyber systems and their interactions. Drawing on operational examples and real-world case studies, it promises to provide both cyber security professionals and cyber technologies designers with the conceptual models and practical methodologies they need to succeed.
Cyber Operations readers will also find:
Detailed discussions of case studies including the 2016 United States Presidential Election, the Dragonfly Campaign, and more
Coverage of cyber attack impacts ranging from the psychological to attacks on physical infrastructure
Insight from an author with top-level experience in cyber security
Cyber Operations is ideal for all technological professionals or policymakers looking to develop their understanding of cyber issues.