Description

US national security compromised by Wikileaks. Towns held hostage by ransomware. Corporate websites hacked. Cyber espionage and cybercrimes are increasing in both frequency and sophistication - requiring the collection of actionable intelligence in order to combat them. Constance Uthoff provides a comprehensive overview of cyber intelligence, explaining what it is, why it is needed, who is doing it, and how it is done.

Notably, Cyber Intelligence:
  • Outlines the roles of the major US intelligence agencies involved.
  • Assesses significant laws and policies from the 1990s to the present.
  • Compares methods and best practices across the public and private sectors.
  • Looks beyond the US to explore the capabilities of actors like China, Iran, and Russia.
  • Includes real-world examples and case studies.

The result is an in-depth examination of the processes and applications of spying in cyberspace, accessible to a wide range of readers.

Cyber Intelligence: Actors, Policies, Practices

Product form

£38.95

Includes FREE delivery
Usually despatched within days
Paperback / softback by Constance S. Uthoff

1 in stock

Description:

US national security compromised by Wikileaks. Towns held hostage by ransomware. Corporate websites hacked. Cyber espionage and cybercrimes are increasing... Read more

    Publisher: Lynne Rienner Publishers Inc
    Publication Date: 30/10/2021
    ISBN13: 9781626379664, 978-1626379664
    ISBN10: 1626379661

    Number of Pages: 441

    Non Fiction , Politics, Philosophy & Society

    Description

    US national security compromised by Wikileaks. Towns held hostage by ransomware. Corporate websites hacked. Cyber espionage and cybercrimes are increasing in both frequency and sophistication - requiring the collection of actionable intelligence in order to combat them. Constance Uthoff provides a comprehensive overview of cyber intelligence, explaining what it is, why it is needed, who is doing it, and how it is done.

    Notably, Cyber Intelligence:
    • Outlines the roles of the major US intelligence agencies involved.
    • Assesses significant laws and policies from the 1990s to the present.
    • Compares methods and best practices across the public and private sectors.
    • Looks beyond the US to explore the capabilities of actors like China, Iran, and Russia.
    • Includes real-world examples and case studies.

    The result is an in-depth examination of the processes and applications of spying in cyberspace, accessible to a wide range of readers.

    Recently viewed products

    © 2024 Book Curl,

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account