語系:
繁體中文
English
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Introduction to Cyberdeception
~
Rowe, Neil C.
Introduction to Cyberdeception
紀錄類型:
書目-語言資料,印刷品 : Monograph/item
正題名/作者:
Introduction to Cyberdeception/ by Neil C. Rowe, Julian Rrushi.
作者:
Rowe, Neil C.
其他作者:
Rrushi, Julian.
面頁冊數:
XIV, 334 p. 61 illus., 49 illus. in color.online resource. :
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-319-41187-3
ISBN:
9783319411873
Introduction to Cyberdeception
Rowe, Neil C.
Introduction to Cyberdeception
[electronic resource] /by Neil C. Rowe, Julian Rrushi. - 1st ed. 2016. - XIV, 334 p. 61 illus., 49 illus. in color.online resource.
Introduction -- Psychology of Deception -- Professional Deception -- Deception Methods for Defense -- Deception Methods for Offense -- Delays -- Fakes -- Defensive Camouflage -- False Excuses -- Defensive Social Engineering -- Measuring Deception -- Planning Cyberspace Deception -- Software Engineering of Deceptive Software and Systems -- Decoy I/O Devices -- Deception for the Electrical Power Industry -- Law and Ethics for Software Deception. .
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems. .
ISBN: 9783319411873
Standard No.: 10.1007/978-3-319-41187-3doiSubjects--Topical Terms:
557122
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Introduction to Cyberdeception
LDR
:03330nam a22004095i 4500
001
978800
003
DE-He213
005
20200706083136.0
007
cr nn 008mamaa
008
201211s2016 gw | s |||| 0|eng d
020
$a
9783319411873
$9
978-3-319-41187-3
024
7
$a
10.1007/978-3-319-41187-3
$2
doi
035
$a
978-3-319-41187-3
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
100
1
$a
Rowe, Neil C.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1113461
245
1 0
$a
Introduction to Cyberdeception
$h
[electronic resource] /
$c
by Neil C. Rowe, Julian Rrushi.
250
$a
1st ed. 2016.
264
1
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2016.
300
$a
XIV, 334 p. 61 illus., 49 illus. in color.
$b
online resource.
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
347
$a
text file
$b
PDF
$2
rda
505
0
$a
Introduction -- Psychology of Deception -- Professional Deception -- Deception Methods for Defense -- Deception Methods for Offense -- Delays -- Fakes -- Defensive Camouflage -- False Excuses -- Defensive Social Engineering -- Measuring Deception -- Planning Cyberspace Deception -- Software Engineering of Deceptive Software and Systems -- Decoy I/O Devices -- Deception for the Electrical Power Industry -- Law and Ethics for Software Deception. .
520
$a
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems. .
650
0
$a
Computer security.
$3
557122
650
0
$a
Computer communication systems.
$3
1115394
650
0
$a
Application software.
$3
528147
650
0
$a
Data encryption (Computer science).
$3
1051084
650
1 4
$a
Systems and Data Security.
$3
677062
650
2 4
$a
Computer Communication Networks.
$3
669310
650
2 4
$a
Information Systems Applications (incl. Internet).
$3
881699
650
2 4
$a
Cryptology.
$3
1211076
700
1
$a
Rrushi, Julian.
$4
aut
$4
http://id.loc.gov/vocabulary/relators/aut
$3
1113462
710
2
$a
SpringerLink (Online service)
$3
593884
773
0
$t
Springer Nature eBook
776
0 8
$i
Printed edition:
$z
9783319411859
776
0 8
$i
Printed edition:
$z
9783319411866
776
0 8
$i
Printed edition:
$z
9783319822884
856
4 0
$u
https://doi.org/10.1007/978-3-319-41187-3
912
$a
ZDB-2-SCS
912
$a
ZDB-2-SXCS
950
$a
Computer Science (SpringerNature-11645)
950
$a
Computer Science (R0) (SpringerNature-43710)
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼[密碼必須為2種組合(英文和數字)及長度為10碼以上]
登入