Cyberwarfare: Information Operations in a Connected World

4.38 (8 ratings by Goodreads)
Regular price €95.99
22544-0
53723-9
978-1-284-22544-0
978-1-284-53723-9
9781284141580
9781284143409
9781284143447
9781284145496
9781284168020
9781284225440
9781284537239
A01=David Seidl
A01=Mike Chapple
Age Group_Uncategorized
Age Group_Uncategorized
Author_David Seidl
Author_Mike Chapple
automatic-update
Category1=Non-Fiction
Category=UTN
Chapple
computer
COP=United States
cryptography
cyber warfare
cyberwarfare
Delivery_Delivery within 10-20 working days
eq_bestseller
eq_computing
eq_isMigrated=2
eq_nobargain
eq_non-fiction
information operations
information security
information systems
information warfare
ISSA
Language_English
network
networking
networking and security
PA=Available
Price_€50 to €100
PS=Active
science
security
Seidl
softlaunch

Product details

  • ISBN 9781284225440
  • Weight: 765g
  • Publication Date: 25 Oct 2021
  • Publisher: Jones and Bartlett Publishers, Inc
  • Publication City/Country: US
  • Product Form: Paperback
  • Language: English
Delivery/Collection within 10-20 working days

Our Delivery Time Frames Explained
2-4 Working Days: Available in-stock

10-20 Working Days: On Backorder

Will Deliver When Available: On Pre-Order or Reprinting

We ship your order once all items have arrived at our warehouse and are processed. Need those 2-4 day shipping items sooner? Just place a separate order for them!

Cyberwarfare: Information Operations in a Connected World puts students on the real-world battlefield of cyberspace! It reviews the role that cyberwarfare plays in modern military operations -- operations in which it has become almost impossible to separate cyberwarfare from traditional warfare.

Part 1 discusses the history of cyberwarfare and the variety of new concerns its emergence has fostered--from tactical considerations to the law of armed conflict and protection of civilians. Part 2 discusses how offensive cyberwarfare has become an important part of the modern military arsenal. The rise of the advanced persistent threat has changed the face of cyberwarfare, and military planners must now be conscious of a series of cyberwarfare actions. In response, the defensive strategies that militaries use have evolved to protect themselves against cyber attacks. The concept of defense-in-depth is critical to building a well-rounded defense that will stand up to cyberwarfare events. Part 3 explores the future of cyberwarfare its interaction with military doctrine and the Pandora's box opened by recent events, which have set the stage for future cyber attacks.

MIKE CHAPPLE, PhD, is teaching professor of information technology at the University of Notre Dame’s Mendoza College of Business.'He previously served as Notre Dame’s Senior Director for IT Service Delivery, where he oversaw the information security function.' In past positions, he served as both a consultant and an active duty Air Force officer. He is a technical editor for Information Security magazine and has written 25 other books, including the Security Study Guide, Information Security Illuminated, and the Official CISSP Study Guide. He earned his undergraduate and PhD degrees from Notre Dame in computer science and engineering. He also holds a master’s degree in computer science from the University of Idaho and an MBA from Auburn University.

David Seidl is the Vice President for Information Technology and CIO at Miami University of Ohio. During his career, he has served in a variety of technical and information security roles including serving at the Senior Director for Campus Technology Services at the University of Notre Dame where he oversaw cloud operations, ERP, databases, identity management, and a broad range of other technologies and services. He also served as Notre Dame's Director of Information Security, led Notre Dame's information security program, and previously taught a popular course on networking and security for Notre Dame's Mendoza College of Business. David has written books on security certification and cyberwarfare including the Security Study Guide, The CYSA Study Guide, The Official (ISC)2 Practice Tests, and numerous other books. David holds a bachelor's degree in Communication Technology and a masters degree in Information Security from Eastern Michigan University, as well as CISSP, GPEN, GCIH, CSA , and Pentest certifications.