Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn t
568 95 27MB
English
Report DMCA / Copyright
DOWNLOAD FILE
This report presents an open source analysis of North Korea's cyber operations capabilities and its strategic impli
160 30 1MB Read more
This book provides a framework for assessing China's extensive cyber espionage efforts and multi-decade modernizati
772 104 383KB Read more
This book explores the future of cyber technologies and cyber operations which will influence advances in social media,
145 82 1MB Read more
As you read this, your computer is in jeopardy of being hacked and your identity being stolen. Read this book to protect
167 84 3MB Read more
This book offers a comprehensive analysis of the international law applicable to cyber operations, including a systemati
2,744 81 3MB Read more
1,768 296 28MB Read more
Get to grips with security operations through incident response, the ATT&CK framework, active defense, and agile thr
263 31 5MB Read more
Russia has deployed cyber operations to interfere in foreign elections, launch disinformation campaigns, and cripple nei
857 68 2MB Read more
Know how to set up, defend, and attack computer networks with this revised and expanded second edition. You will learn
589 90 26MB Read more
What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cy
248 53 3MB Read more