Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
Cover image Title page Table of Contents Copyright Dedication Author Biography Introduction
Book Overview and Key Learning Points Book Audience How this Book is Organized Conclusion
Chapter 1. Cyber Threatscape
How Did We Get Here? Attack Methodology Plus Tools/Techniques Used Attackers (The Types of Threats) How Most Organizations Defend Today (Defensive Mountain Range)? Targeted Capabilities (What We Should be Defending) Summary References
Chapter 2. Cyberspace Battlefield Operations
What is Cyber Warfare? Cyber War—Hype or Reality Boundaries in Cyber Warfare Where Cyber Fits in the War-Fighting Domains Summary References
Chapter 3. Cyber Doctrine
Current US Doctrine Sample Doctrine / Strategy From Around the World Some Key Military Principles that Must be Adapted to Cyber Warfare Summary References
Chapter 4. Tools and Techniques
Logical Weapons Physical Weapons Summary References
Chapter 5. Offensive Tactics and Procedures
Computer Network Exploitation Computer Network Attack Summary References
Chapter 6. Psychological Weapons
Social Engineering Explained How the Military Approaches Social Engineering How the Military Defends against Social Engineering Summary References
Chapter 7. Defensive Tactics and Procedures
What We Protect Security Awareness and Training Defending Against Cyber Attacks Summary References
Chapter 8. Challenges We Face
Cybersecurity Issues defined Interrelationship of Cybersecurity Issues Way Ahead Summary References
Chapter 9. Where is Cyber Warfare Headed?
Technology-Based Trends Policy-Based Trends How to Defend in Today’s Contested Virtual Environment Summary References
Index
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion