語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Introduction to cyberdeception
~
Rowe, Neil C.
FindBook
Google Book
Amazon
博客來
Introduction to cyberdeception
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Introduction to cyberdeception/ by Neil C. Rowe, Julian Rrushi.
作者:
Rowe, Neil C.
其他作者:
Rrushi, Julian.
出版者:
Cham :Springer International Publishing : : 2016.,
面頁冊數:
xiv, 334 p. :ill. (some col.), digital ;24 cm.
內容註:
Introduction -- Psychology of Deception -- Professional Deception -- Deception Methods for Defense -- Deception Methods for Offense -- Delays -- Fakes -- Defensive Camouflage -- False Excuses -- Defensive Social Engineering -- Measuring Deception -- Planning Cyberspace Deception -- Software Engineering of Deceptive Software and Systems -- Decoy I/O Devices -- Deception for the Electrical Power Industry -- Law and Ethics for Software Deception.
Contained By:
Springer eBooks
標題:
Computer security. -
電子資源:
http://dx.doi.org/10.1007/978-3-319-41187-3
ISBN:
9783319411873$q(electronic bk.)
Introduction to cyberdeception
Rowe, Neil C.
Introduction to cyberdeception
[electronic resource] /by Neil C. Rowe, Julian Rrushi. - Cham :Springer International Publishing :2016. - xiv, 334 p. :ill. (some col.), digital ;24 cm.
Introduction -- Psychology of Deception -- Professional Deception -- Deception Methods for Defense -- Deception Methods for Offense -- Delays -- Fakes -- Defensive Camouflage -- False Excuses -- Defensive Social Engineering -- Measuring Deception -- Planning Cyberspace Deception -- Software Engineering of Deceptive Software and Systems -- Decoy I/O Devices -- Deception for the Electrical Power Industry -- Law and Ethics for Software Deception.
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.
ISBN: 9783319411873$q(electronic bk.)
Standard No.: 10.1007/978-3-319-41187-3doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Introduction to cyberdeception
LDR
:02926nmm a2200325 a 4500
001
2052367
003
DE-He213
005
20160923151620.0
006
m d
007
cr nn 008maaau
008
170421s2016 gw s 0 eng d
020
$a
9783319411873$q(electronic bk.)
020
$a
9783319411859$q(paper)
024
7
$a
10.1007/978-3-319-41187-3
$2
doi
035
$a
978-3-319-41187-3
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
R879 2016
100
1
$a
Rowe, Neil C.
$3
692022
245
1 0
$a
Introduction to cyberdeception
$h
[electronic resource] /
$c
by Neil C. Rowe, Julian Rrushi.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2016.
300
$a
xiv, 334 p. :
$b
ill. (some col.), digital ;
$c
24 cm.
505
0
$a
Introduction -- Psychology of Deception -- Professional Deception -- Deception Methods for Defense -- Deception Methods for Offense -- Delays -- Fakes -- Defensive Camouflage -- False Excuses -- Defensive Social Engineering -- Measuring Deception -- Planning Cyberspace Deception -- Software Engineering of Deceptive Software and Systems -- Decoy I/O Devices -- Deception for the Electrical Power Industry -- Law and Ethics for Software Deception.
520
$a
This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots. It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.
650
0
$a
Computer security.
$3
540555
650
0
$a
Data encryption (Computer science)
$3
579162
650
0
$a
Computer science.
$3
523869
650
0
$a
Computer networks.
$3
539554
650
1 4
$a
Computer Science.
$3
626642
650
2 4
$a
Systems and Data Security.
$3
898223
650
2 4
$a
Computer Communication Networks.
$3
775497
650
2 4
$a
Information Systems Applications (incl. Internet)
$3
1565452
650
2 4
$a
Data Encryption.
$3
891254
700
1
$a
Rrushi, Julian.
$3
3135611
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-41187-3
950
$a
Computer Science (Springer-11645)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9286220
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入