Siga este link para ver outros tipos de publicações sobre o tema: Cyber defensive.

Livros sobre o tema "Cyber defensive"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores livros para estudos sobre o assunto "Cyber defensive".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja os livros das mais diversas áreas científicas e compile uma bibliografia correta.

1

Carayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos, eds. Cyber-Development, Cyber-Democracy and Cyber-Defense. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4939-1028-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Carayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos, eds. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-06091-0.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Kott, Alexander, Cliff Wang e Robert F. Erbacher, eds. Cyber Defense and Situational Awareness. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-11391-3.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Kott, Alexander, ed. Autonomous Intelligent Cyber Defense Agent (AICA). Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-29269-9.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Jajodia, Sushil, George Cybenko, Peng Liu, Cliff Wang e Michael Wellman, eds. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Vijayalakshmi, S., P. Durgadevi, Lija Jacob, Balamurugan Balusamy e Parma Nand. Artificial Intelligence for Cyber Defense and Smart Policing. Boca Raton: Chapman and Hall/CRC, 2024. http://dx.doi.org/10.1201/9781003251781.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Rani Panigrahi, Chhabi, Victor Hugo C. de Albuquerque, Akash Kumar Bhoi e Hareesha K.S. Big Data and Edge Intelligence for Enhanced Cyber Defense. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003215523.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

1958-, Nemati Hamid R., e Yang, Li, 1974 Oct. 29-, eds. Applied cryptography for cyber security and defense: Information encryption and cyphering. Hershey, PA: Information Science Reference, 2010.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Belk, Robert. On the use of offensive cyber capabilities: A policy analysis for the Department of Defense Office of Cyber Policy. Cambridge, Mass: John F. Kennedy School of Government, 2012.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Moore, Alexis. Cyber self-defense: Expert advice to avoid online predators, identity theft, and cyberbullying. Guilford, Connecticut: Lyons Press, 2014.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Almomani, Iman, e Nick Ayres. Cyber Malware: Offensive and Defensive Systems. Springer International Publishing AG, 2023.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Kello, Lucas. Cyber Defence. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0039.

Texto completo da fonte
Resumo:
Europe confronts an enormous cyber threat. The continent hosted the first international cyber crisis—the 2007 attacks by Russian political activists that crashed computer infrastructures in Estonia. Large European nations such as the UK and France focus their defensive efforts on proactive measures, which seek to neutralize threats before they materialize. Another tool of large powers is deterrence by punishment, an attempt to prevent hostile action with the pledge of severe reprisal. Smaller powers, by contrast, lack the resources necessary to implement proactive measures or deterrence. They focus instead on reactive methods such as resiliency and redundancy, which seek to absorb the damage of attack. They strive to prevent major cyberattacks by participating in regional organizations such as NATO. Whatever their differences in doctrinal approach, European nations small and large confront a common challenge: how to defeat a novel threat in the absence of conclusive experience on which to revise strategy.
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

The Intelligence Technology and Big Eye Secrets: Navigating the Complex World of Cybersecurity and Espionage. 49books, 2023.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Pavisic, Ivica, Anthony Lawrence, Chaitra M. Hardison, Leslie Adrienne Payne e Julia Whitaker. Building the Best Offensive and Defensive Cyber Workforce: Attracting and Retaining Enlisted and Civilian Personnel. RAND Corporation, The, 2021.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Goldsmith, Jack, ed. The United States' Defend Forward Cyber Strategy. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780197601792.001.0001.

Texto completo da fonte
Resumo:
The United States’ new Defend Forward Strategy constitutes a major change in how the nation with the world’s most powerful cyber arsenal views when and how this arsenal should be deployed. It is a large step in the direction of more aggressive action in cyberspace—albeit for defensive ends. The United States has not attempted to hide this new and more aggressive cyber posture. To the contrary, it has telegraphed the change, probably in order to enhance deterrence. But the telegraphing has taken place at a highly abstract level. Very little is known about precisely what types of operations Defend Forward entails. And while the US government has asserted that Defend Forward is consistent with domestic and international law, it has not explained how the new strategy overcomes the perceived legal constraints that previously tempered US responses to cyber intrusions and threats. This volume aims to fill these gaps, and to bring Defend Forward out of the shadows, so to speak, both factually and legally.
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Pavisic, Ivica, Chaitra M. Hardison, Danielle Bean, Julia Whitaker e Jenna W. Kramer. Building the Best Offensive and Defensive Cyber Workforce: Improving U. S. Air Force Training and Development. RAND Corporation, The, 2021.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Buchanan, Ben. The Defender’s View. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0004.

Texto completo da fonte
Resumo:
This chapter examines defensive cyber operations in a fashion similar to kill chain analysis. It presents an outline of how baseline network defense is done, and what technologies and techniques contribute to that mission. This includes memory forensics, penetration testing, and incident response. It shows as well how those efforts are likely to be insufficient, and how advanced states have an incentive to go further and intrude into other states’ networks for defensive reasons—operations that are sometimes called counter-computer network exploitation. It is these intrusions, which are genuinely defensive, that can be misperceived and interpreted as offensive intrusions—leading to a cycle of escalation.
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Building the Best Offensive and Defensive Cyber Workforce: Volume I, Improving U.S. Air Force Training and Development. RAND Corporation, 2021. http://dx.doi.org/10.7249/rr-a1056-1.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Building the Best Offensive and Defensive Cyber Workforce: Volume II, Attracting and Retaining Enlisted and Civilian Personnel. RAND Corporation, 2021. http://dx.doi.org/10.7249/rr-a1056-2.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Valeriano, Brandon. The United States. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190618094.003.0007.

Texto completo da fonte
Resumo:
This chapter analyzes US cyber strategy and coercion against rival states. First, the chapter situates the US approach to cyber in the larger intellectual history surrounding a preference for precision strike and how it alters the character of war for US strategists. Second, the chapter connects this logic to the emergence of information warfare concepts in the early 1990s, when US practitioners began to integrate cyber into larger visions of precision strike. Next, the chapter shifts to outline the American approach to cyber coercion. We offer a portrait of how the leading cyber power uses covert coercive cyber actions to shape rival behavior in the digital domain. These insights highlight the importance of the reconnaissance-strike as a strategic construct. They also demonstrate the US approach toward cyber espionage and turning defensive measures into attack vectors through deception.
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Buchanan, Ben. The Cybersecurity Dilemma. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.001.0001.

Texto completo da fonte
Resumo:
Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to penetrate each other's systems. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the “security dilemma”. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Carayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, 2018.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Carayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, 2018.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Carayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos. Handbook of Cyber-Development, Cyber-Democracy, and Cyber-Defense. Springer, 2018.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Buchanan, Ben. How Network Intrusions Threaten. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780190665012.003.0005.

Texto completo da fonte
Resumo:
This chapter shows how any network intrusion into a strategically-important network is threatening. Hacking is thus a key part of international relations. This is true regardless of whether or not the intrusion was launched with offensive or defensive intent. The risk of misperception is real, and the threats enabled by a network intrusion are significant. Network intrusions offer the capacity for tailored cyber attacks, for more basic wiper attacks, for general intelligence collection and espionage, and for counterintelligence work. It is very difficult to determine the intentions of an intruder, and they can change very easily—all of which leads to the possibility of danger and animates the cybersecurity dilemma.
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

M, Lee Robert. Active Cyber Defense Cycle. Wiley & Sons, Incorporated, John, 2019.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Yang, Lin, e Quan Yu. Dynamically-Enabled Cyber Defense. World Scientific Publishing Co Pte Ltd, 2021.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

M, Lee Robert. Active Cyber Defense Cycle. Wiley & Sons, Incorporated, John, 2019.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

M, Lee Robert. Active Cyber Defense Cycle. Wiley & Sons, Incorporated, John, 2019.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Giles, Keir, Strategic Studies Institute e Kim Hartmann. Cyber Defense: An International View. Lulu Press, Inc., 2015.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Kott, Alexander, Cliff Wang e Robert F. Erbacher. Cyber Defense and Situational Awareness. Springer, 2016.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Kott, Alexander, Cliff Wang e Robert F. Erbacher. Cyber Defense and Situational Awareness. Springer, 2015.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Stiennon, Richard. Cyber Defense: Countering Targeted Attacks. Rowman & Littlefield Publishers, Incorporated, 2012.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Cyber Reconnaissance, Surveillance and Defense. Elsevier, 2015. http://dx.doi.org/10.1016/c2013-0-13412-5.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Cyber Defense: Countering Targeted Attacks. Government Institutes, 2011.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Cartwright, Adam. Ransomware: Threat Centric Cyber Defense. Independently Published, 2022.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Kott, Alexander, Cliff Wang e Robert F. Erbacher. Cyber Defense and Situational Awareness. Springer, 2015.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Shimonski, Robert. Cyber Reconnaissance, Surveillance and Defense. Elsevier Science & Technology Books, 2014.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Giles, Keir, . Strategic Studies Institute (U.S.), Douglas C. Lovelace Jr, Kim Hartmann e . Army War College (U.S.). Cyber Defense: An International View. Department of the Army, 2016.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Giles, Keir, Strategic Studies Institute e Kim Hartmann. Cyber Defense: An International View. Independently Published, 2015.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Cyber Defense and Situational Awareness. Springer, 2015.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Cyber Defense: Countering Targeted Attacks. Rowman & Littlefield Publishers, Incorporated, 2000.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Cyber Reconnaissance, Surveillance and Defense. Syngress, 2014.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Amoroso, Edward. Cyber Security. Silicon Press, 2006.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Gheorghe, A. V., U. Tatar e Y. Gokce. Strategic Cyber Defense: A Multidisciplinary Perspective. IOS Press, Incorporated, 2017.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Newman, Maxine. U. S. Cyber Strategies. Nova Science Publishers, Incorporated, 2016.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Carayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos. Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice. Springer London, Limited, 2014.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Carayannis, Elias G., David F. J. Campbell e Marios Panagiotis Efthymiopoulos. Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice. Springer, 2016.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Cyber-Development, Cyber-Democracy and Cyber-Defense: Challenges, Opportunities and Implications for Theory, Policy and Practice. Springer, 2014.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Bronk, Chris. Cyber Threat. ABC-CLIO, LLC, 2016. http://dx.doi.org/10.5040/9798400636455.

Texto completo da fonte
Resumo:
This book presents a holistic view of the geopolitics of cyberspace that have arisen over the past decade, utilizing recent events to explain the international security dimension of cyber threat and vulnerability, and to document the challenges of controlling information resources and protecting computer systems. How are the evolving cases of cyber attack and breach as well as the actions of government and corporations shaping how cyberspace is governed? What object lessons are there in security cases such as those involving Wikileaks and the Snowden affair? An essential read for practitioners, scholars, and students of international affairs and security, this book examines the widely pervasive and enormously effective nature of cyber threats today, explaining why cyber attacks happen, how they matter, and how they may be managed. The book addresses a chronology of events starting in 2005 to comprehensively explain the international security dimension of cyber threat and vulnerability. It begins with an explanation of contemporary information technology, including the economics of contemporary cloud, mobile, and control systems software as well as how computing and networking—principally the Internet—are interwoven in the concept of cyberspace. Author Chris Bronk, PhD, then documents the national struggles with controlling information resources and protecting computer systems. The book considers major security cases such as Wikileaks, Stuxnet, the cyber attack on Estonia, Shamoon, and the recent exploits of the Syrian Electronic Army. Readers will understand how cyber security in the 21st century is far more than a military or defense issue, but is a critical matter of international law, diplomacy, commerce, and civil society as well.
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!

Vá para a bibliografia