L'édition de cet ISBN n'est malheureusement plus disponible.
Afficher les exemplaires de cette édition ISBN
Frais de port :
EUR 4,68
Vers Etats-Unis
Description du livre Hardcover. Etat : New. SHRINK-WRAPPED: US SELLER SHIPS FROM USA. N° de réf. du vendeur 119A4-HC-1610694430-1P6-2015-GRY-B12
Description du livre Hardcover. Etat : new. New. Fast Shipping and good customer service. N° de réf. du vendeur Holz_New_1610694430
Description du livre Hardcover. Etat : new. New Copy. Customer Service Guaranteed. N° de réf. du vendeur think1610694430
Description du livre Etat : New. N° de réf. du vendeur ABLIING23Mar2811580129331
Description du livre Etat : New. N° de réf. du vendeur 21983949-n
Description du livre HRD. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000. N° de réf. du vendeur L1-9781610694438
Description du livre Hardcover. Etat : new. N° de réf. du vendeur 9781610694438
Description du livre Etat : New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. N° de réf. du vendeur ria9781610694438_lsuk
Description du livre Hardcover. Etat : new. Hardcover. This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat.Cyber warfare is gaining prominence as a serious tactic in military conflicts throughout the world. And, as the most network-dependent nation on earth, the United States is the most vulnerable. Military expert and author Paul J. Springer examines the many facets of cyber combatfrom the threats of information exposure that American civilians encounter on a daily basis, to the concern of keeping up with the capabilities of China and Russia, to the inherent dangers in ignoring cyber threats.This essential referencethe only of its kind to include an overview of other cyber warfare literatureemphasizes the importance of cyber operations in modern conflicts, detailing the efforts that have been made by government agencies to create networks that are secure. Noted experts in the field weigh in on the problems of attribution during a cyber attack, the detection of cyber intrusions, and the possible solutions for preventing data breaches. The book features profiles of theorists, commanders, and inventors; as well as organizations dedicated to cyber attacks, including government and military operations, industrial cyber security companies, and academic centers. This timely handbook traces the development of cyber capabilities from their roots in information warfare and cryptology to their potential military application in combat. Shipping may be from multiple locations in the US or from the UK, depending on stock availability. N° de réf. du vendeur 9781610694438
Description du livre Etat : New. N° de réf. du vendeur 21983949-n