skip to content
Cyber guerilla Preview this item
ClosePreview this item
Checking...

Cyber guerilla

Author: Jelle Van Haaster; Rickey Gevers; Martijn Sprengers
Publisher: Amsterdam : Elsevier, 2016.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
Providing valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors, this book takes readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. --
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Jelle Van Haaster; Rickey Gevers; Martijn Sprengers
ISBN: 9780128052846 0128052848
OCLC Number: 951807318
Description: 1 online resource
Contents: 1. General Principles 2. The Hacker Group 3. Organisation of #Operations 4. Appendices
Responsibility: Jelle van Haaster, Rickey Gevers, Martijn Sprengers.

Abstract:

Providing valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors, this book takes readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. --

Reviews

Editorial reviews

Publisher Synopsis

"...a how-to manual that covers all the most important aspects of setting up an effective hacker group that means to engage in cyber guerrilla incursions...an interesting and relatively short read." Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/951807318> # Cyber guerilla
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    library:oclcnum "951807318" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/ne> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/2959717567#Place/amsterdam> ; # Amsterdam
    rdfs:comment "Warning: This malformed URI has been treated as a string - 'http://images.contentreserve.com/ImageType-100/1706-1/{D41576C3-3F0F-4ADA-95ED-11877F633646}Img100.jpg'" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/2959717567#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/2959717567#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/2959717567#Topic/computers_security_networking> ; # COMPUTERS--Security--Networking
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/2959717567#Person/gevers_rickey> ; # Rickey Gevers
    schema:contributor <http://experiment.worldcat.org/entity/work/data/2959717567#Person/sprengers_martijn> ; # Martijn Sprengers
    schema:creator <http://experiment.worldcat.org/entity/work/data/2959717567#Person/van_haaster_jelle> ; # Jelle Van Haaster
    schema:datePublished "2016" ;
    schema:description "Providing valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors, this book takes readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. --"@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/2959717567> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:name "Cyber guerilla"@en ;
    schema:productID "951807318" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/951807318#PublicationEvent/amsterdam_elsevier_2016> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/2959717567#Agent/elsevier> ; # Elsevier
    schema:url <http://0-www.sciencedirect.com.pugwash.lib.warwick.ac.uk/science/book/9780128051979> ;
    schema:url <https://www.overdrive.com/search?q=D41576C3-3F0F-4ADA-95ED-11877F633646> ;
    schema:url "http://images.contentreserve.com/ImageType-100/1706-1/{D41576C3-3F0F-4ADA-95ED-11877F633646}Img100.jpg" ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=4557157> ;
    schema:url <http://samples.overdrive.com/?crid=d41576c3-3f0f-4ada-95ed-11877f633646&.epub-sample.overdrive.com> ;
    schema:url <http://remote.baruch.cuny.edu/login?url=http://library.books24x7.com/library.asp?> ;
    schema:url <http://site.ebrary.com/id/11223441> ;
    schema:url <http://www.myilibrary.com?id=931832> ;
    schema:url <http://public.ebookcentral.proquest.com/choice/publicfullrecord.aspx?p=4557157> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1144851> ;
    schema:url <http://gold.worcester.edu/login?url=http://ebookcentral.proquest.com/lib/masslibsystem/detail.action?docID=4557157> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=115852> ;
    schema:workExample <http://worldcat.org/isbn/9780128052846> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/951807318> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/2959717567#Person/gevers_rickey> # Rickey Gevers
    a schema:Person ;
    schema:familyName "Gevers" ;
    schema:givenName "Rickey" ;
    schema:name "Rickey Gevers" ;
    .

<http://experiment.worldcat.org/entity/work/data/2959717567#Person/sprengers_martijn> # Martijn Sprengers
    a schema:Person ;
    schema:familyName "Sprengers" ;
    schema:givenName "Martijn" ;
    schema:name "Martijn Sprengers" ;
    .

<http://experiment.worldcat.org/entity/work/data/2959717567#Person/van_haaster_jelle> # Jelle Van Haaster
    a schema:Person ;
    schema:familyName "Van Haaster" ;
    schema:givenName "Jelle" ;
    schema:name "Jelle Van Haaster" ;
    .

<http://experiment.worldcat.org/entity/work/data/2959717567#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2959717567#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/2959717567#Topic/computers_security_networking> # COMPUTERS--Security--Networking
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--Networking"@en ;
    .

<http://worldcat.org/isbn/9780128052846>
    a schema:ProductModel ;
    schema:isbn "0128052848" ;
    schema:isbn "9780128052846" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.