Installieren Sie die genialokal App auf Ihrem Startbildschirm für einen schnellen Zugriff und eine komfortable Nutzung.
Tippen Sie einfach auf Teilen:
Und dann auf "Zum Home-Bildschirm [+]".
Bei genialokal.de kaufen Sie online bei Ihrer lokalen, inhabergeführten Buchhandlung!
Ihr gewünschter Artikel ist in 0 Buchhandlungen vorrätig - wählen Sie hier eine Buchhandlung in Ihrer Nähe aus:
This book addresses the issues that the digital world has created. The culpability, causal links and even liabilities that go towards these war crime atrocities. It tells a side to the world's first ever cyberwar that you would never otherwise see, or possibly hear about.
Andrew Jenkinson is CEO of Cybersec Innovation Partners. 8 years Risk, compliance and Cyber Security experience. 20 years prior CEO of Charterhouse Risk and Compliance, led a total team from zero to over 500 resources of technical experts including leading a program for Sun Microsystems as a client for nearly ten years and other government contracts. After publishing his first book, Stuxnet to Sunburst and Ransomware and Cybercrime, Andrew was subsequently made a Fellow of the Cyber Theory Institute and acknowledged as a Thought Leader in the field of Public Key Infrastructure, Domain Name System, both the fundamental basic of all security. He has also been named as one of the worlds leading 30 Cyber Security Experts by The European Institute of Risk. Other books by this author: Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare https://www.routledge.com/Stuxnet-to-Sunburst-20-Years-of-Digital-Exploitation-and-Cyber-Warfare/Jenkinson/p/book/9781032068503 Ransomware and Cybercrime https://www.routledge.com/Ransomware-and-Cybercrime/Jenkinson/p/book/9781032235509
Preface. Author. Part I History. Chapter 1 The History of War and Cyber Warfare. Chapter 2 The History of Cybersecurity. Part II Technology. Chapter 3 Domain Name System (DNS) Attacks. Chapter 4 Content Delivery Networks (CDNs). Chapter 5 Cloud Computing: A Gamble? Chapter 6 OSINT: Open-Source Intelligence. Chapter 7 Digital Perimeter Defences. Part III Examples of Previous Attacks and Insecurities. Chapter 8 US Government Security Failings. Chapter 9 UK Government Security Failings. Chapter 10 Okta Cyberattack: More Basic Security Failures. Chapter 11 Stuxnet. Chapter 12 Lloyds: Shortfall of Knowledge. Part IV The Ukraine Cyberwar. Chapter 13 Why Has Russia Invaded Ukraine? Chapter 14 Sanctions on Russia Following the War in Ukraine. Chapter 15 Eight Years of Cyberattacks on Ukraine. Chapter 16 Russian Allies and Enemies. Chapter 17 Digital Defences Down. Chapter 18 Ukraine Report: Ukraine Cyberwar Using Insecure Websites to Take Over Control. Chapter 19 Microsoft: There Is Something Rotten in Redmond. Chapter 20 Perimeter Defence Theory in Context: Ukraine. Chapter 21 Cyberattacks against Russia. Chapter 22 Global Security Errors. CONCLUSION. AFTERWORD. INDEX.