The Art of War for Computer Security

In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Madsen, Tom (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Cham : Springer International Publishing : Imprint: Springer, 2019.
Έκδοση:1st ed. 2019.
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03107nam a2200481 4500
001 978-3-030-28569-2
003 DE-He213
005 20191024142123.0
007 cr nn 008mamaa
008 190903s2019 gw | s |||| 0|eng d
020 |a 9783030285692  |9 978-3-030-28569-2 
024 7 |a 10.1007/978-3-030-28569-2  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
082 0 4 |a 005.8  |2 23 
100 1 |a Madsen, Tom.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 4 |a The Art of War for Computer Security  |h [electronic resource] /  |c by Tom Madsen. 
250 |a 1st ed. 2019. 
264 1 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2019. 
300 |a X, 62 p. 2 illus. in color.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
505 0 |a Who Was Sun Tzu? -- Estimates -- Waging War -- Offensive Strategy -- Dispositions -- Energy -- Weaknesses and Strengths -- The Nine Variables -- The Nine Varieties of Ground -- Attack by Fire -- Employment of Secret Agents -- The Final Word -- App. A, Center for Internet Security Critical Security Controls. 
520 |a In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an original title in The Art of War, where the author offers a general introduction to the content and then describes its application in a cybersecurity setting. These chapters cover estimates; waging war; offensive strategy; how you prepare for an attack; energy; weaknesses and strengths; the variables that need consideration before embarking on a war; how infrastructure is related to the concept of ground; attack by fire or how skilled attackers hide behind noise; and employing secret agents. The book will be interesting for computer security researchers and professionals who would like some grounding in a security mindset. 
650 0 |a Data protection. 
650 0 |a Computer crimes. 
650 0 |a System safety. 
650 1 4 |a Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28000 
650 2 4 |a Cybercrime.  |0 http://scigraph.springernature.com/things/product-market-codes/1B7000 
650 2 4 |a Security Science and Technology.  |0 http://scigraph.springernature.com/things/product-market-codes/P31080 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783030285685 
776 0 8 |i Printed edition:  |z 9783030285708 
776 0 8 |i Printed edition:  |z 9783030285715 
856 4 0 |u https://doi.org/10.1007/978-3-030-28569-2  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
950 |a Computer Science (Springer-11645)