Introduction to Cyberdeception

Nonfiction, Computers, Networking & Communications, Computer Security, Operating Systems, Application Software
Cover of the book Introduction to Cyberdeception by Julian Rrushi, Neil C. Rowe, Springer International Publishing
View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart
Author: Julian Rrushi, Neil C. Rowe ISBN: 9783319411873
Publisher: Springer International Publishing Publication: September 23, 2016
Imprint: Springer Language: English
Author: Julian Rrushi, Neil C. Rowe
ISBN: 9783319411873
Publisher: Springer International Publishing
Publication: September 23, 2016
Imprint: Springer
Language: English

This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots.  It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.

Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. 

Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.  

View on Amazon View on AbeBooks View on Kobo View on B.Depository View on eBay View on Walmart

This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots.  It contains features friendly for classroom use: (1) minimal use of programming details and mathematics, (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list.

Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application. 

Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.  

More books from Springer International Publishing

Cover of the book Migration, Risk Management and Climate Change: Evidence and Policy Responses by Julian Rrushi, Neil C. Rowe
Cover of the book Regional Economic Organizations and Conventional Security Challenges by Julian Rrushi, Neil C. Rowe
Cover of the book Water Resources in Slovakia: Part I by Julian Rrushi, Neil C. Rowe
Cover of the book Halophiles by Julian Rrushi, Neil C. Rowe
Cover of the book The Political Anatomy of Domination by Julian Rrushi, Neil C. Rowe
Cover of the book Boredom in the Classroom by Julian Rrushi, Neil C. Rowe
Cover of the book Analysis of Deterministic Cyclic Gene Regulatory Network Models with Delays by Julian Rrushi, Neil C. Rowe
Cover of the book Interdisciplinary Perspectives on Trust by Julian Rrushi, Neil C. Rowe
Cover of the book Model Checking Software by Julian Rrushi, Neil C. Rowe
Cover of the book MRI of the Pituitary Gland by Julian Rrushi, Neil C. Rowe
Cover of the book Incorporation of Heterocycles into Combinatorial Chemistry by Julian Rrushi, Neil C. Rowe
Cover of the book Image-Based Multilevel Biomechanical Modeling for Fall-Induced Hip Fracture by Julian Rrushi, Neil C. Rowe
Cover of the book Metal-Matrix Composites Innovations, Advances and Applications by Julian Rrushi, Neil C. Rowe
Cover of the book Advances in Ergonomics of Manufacturing: Managing the Enterprise of the Future by Julian Rrushi, Neil C. Rowe
Cover of the book Thermodynamic Properties of Cryogenic Fluids by Julian Rrushi, Neil C. Rowe
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy