Narrow your search
Listing 1 - 10 of 63 << page
of 7
>>
Sort by

Book
Beiträge zur territorialen Produktionsstruktur
Author:
Year: 1976 Publisher: Gotha Haack

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

The Armenian kingdom in Cilicia during the Crusades : the integration of Cilician Armenians with the Latins, 1080-1393
Author:
ISBN: 9781138862579 1138862576 9780700714186 Year: 2014 Publisher: London : Routledge,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This unique study bridges the history of the Crusades with the history of Armenian nationalism and Christianity. To the Crusaders, Armenian Christians presented the only reliable allies in Anatolia and Asia Minor, and were pivotal in the founding of the Crusader principalities of Edessa, Antioch, Jerusalem and Tripoli. The Anatolian kingdom of Cilicia was founded by the Roupenian dynasty (mid 10th to late 11th century), and grew under the collective rule of the Hetumian dynasty (late 12th to mid 14th century). After confrontations with Byzantium, the Seljuks and the Mongols, the Second Crusade led to the crowning of the first Cilician king despite opposition from Byzantium. Following the Third Crusade, power shifted in Cilicia to the Lusignans of Cyprus (mid to late 14th century), culminating in the final collapse of the kingdom at the hands of the Egyptian Mamluks.


Book
Professional Red Teaming : Conducting Successful Cybersecurity Engagements
Author:
ISBN: 1484243099 1484243080 Year: 2019 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You’ll Learn: Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes.


Book
Waging cyber war : technical challenges and operational constraints
Author:
ISBN: 148424950X 1484249496 1523150432 Year: 2019 Publisher: Berkeley, California : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Understand the challenges of implementing a cyber warfare strategy and conducting cyber warfare. This book addresses the knowledge gaps and misconceptions of what it takes to wage cyber warfare from the technical standpoint of those with their hands on the keyboard. You will quickly appreciate the difficulty and complexity of executing warfare within the cyber domain. Included is a detailed illustration of cyber warfare against the backdrop of national and international policy, laws, and conventions relating to war. Waging Cyber War details technical resources and activities required by the cyber war fighter. Even non-technical readers will gain an understanding of how the obstacles encountered are not easily mitigated and the irreplaceable nature of many cyber resources. You will walk away more informed on how war is conducted from a cyber perspective, and perhaps why it shouldn’t be waged. And you will come to know how cyber warfare has been covered unrealistically, technically misrepresented, and misunderstood by many. What You’ll Learn: Understand the concept of warfare and how cyber fits into the war-fighting domain Be aware of what constitutes and is involved in defining war and warfare as well as how cyber fits in that paradigm and vice versa Discover how the policies being put in place to plan and conduct cyber warfare reflect a lack of understanding regarding the technical means and resources necessary to perform such actions Know what it means to do cyber exploitation, attack, and intelligence gathering; when one is preferred over the other; and their specific values and impacts on each other Be familiar with the need for, and challenges of, enemy attribution Realize how to develop and scope a target in cyber warfare Grasp the concept of self-attribution: what it is, the need to avoid it, and its impact See what goes into establishing the access from which you will conduct cyber warfare against an identified target Appreciate how association affects cyber warfare Recognize the need for resource resilience, control, and ownership Walk through the misconceptions and an illustrative analogy of why cyber warfare doesn't always work as it is prescribed.


Book
Cybersecurity for Space : Protecting the Final Frontier
Author:
ISBN: 1484257324 1484257316 Year: 2020 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats. Space is one of the fastest growing military, government, and industry sectors. Because everything in today’s world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations. You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems. The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems. You will: Understand what constitutes a space system and the challenges unique to operations of all spacecraft Get introduced to various space vehicles and their unique constraints and challenges Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit Know the physical and cyber vectors from which threats may manifest Study the micro- and macro-analysis provided of space system attack scenarios Be familiar with the high-level problems of cybersecurity in the space domain.


Book
Theoretical cybersecurity : principles and advanced concepts
Author:
ISBN: 148428299X 1484283007 Year: 2022 Publisher: Berkeley, California : Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

There is a distinct lack of theoretical innovation in the cybersecurity industry. This is not to say that innovation is lacking, as new technologies, services, and solutions (as well as buzzwords) are emerging every day. This book will be the first cybersecurity text aimed at encouraging abstract and intellectual exploration of cybersecurity from the philosophical and speculative perspective. Technological innovation is certainly necessary, as it furthers the purveying of goods and services for cybersecurity producers in addition to securing the attack surface of cybersecurity consumers where able. The issue is that the industry, sector, and even academia are largely technologically focused. There is not enough work done to further the trade--the craft of cybersecurity. This book frames the cause of this and other issues, and what can be done about them. Potential methods and directions are outlined regarding how the industry can evolve to embrace theoretical cybersecurity innovation as it pertains to the art, as much as to the science. To do this, a taxonomy of the cybersecurity body of work is laid out to identify how the influences of the industry's past and present constrain future innovation. Then, cost-benefit analysis and right-sizing of cybersecurity roles and responsibilities--as well as defensible experimentation concepts--are presented as the foundation for moving beyond some of those constraining factors that limit theoretical cybersecurity innovation. Lastly, examples and case studies demonstrate future-oriented topics for cybersecurity theorization such as game theory, infinite-minded methodologies, and strategic cybersecurity implementations. What you'll learn The current state of the cybersecurity sector and how it constrains theoretical innovation How to understand attacker and defender cost benefit The detect, prevent, and accept paradigm How to build your own cybersecurity box Supporting cybersecurity innovation through defensible experimentation How to implement strategic cybersecurity Infinite vs finite game play in cybersecurity Who This Book Is For This book is for both practitioners of cybersecurity and those who are required to, or choose to, employ such services, technology, or capabilities.

A concordance to the principal Upaniṣads and Bhagavadgītā
Author:
ISBN: 9788120812819 8120812816 Year: 1999 Publisher: New Delhi: Motilal Banarsidass,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Book
A concordance to the principal Upaniṣads and Bhagavadgītā
Author:
Year: 1963 Publisher: Delhi: Motilal Banarsidass,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords


Digital
Professional Red Teaming : Conducting Successful Cybersecurity Engagements
Author:
ISBN: 9781484243091 Year: 2019 Publisher: Berkeley, CA Apress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Use this unique book to leverage technology when conducting offensive security engagements. You will understand practical tradecraft, operational guidelines, and offensive security best practices as carrying out professional cybersecurity engagements is more than exploiting computers, executing scripts, or utilizing tools. Professional Red Teaming introduces you to foundational offensive security concepts. The importance of assessments and ethical hacking is highlighted, and automated assessment technologies are addressed. The state of modern offensive security is discussed in terms of the unique challenges present in professional red teaming. Best practices and operational tradecraft are covered so you feel comfortable in the shaping and carrying out of red team engagements. Anecdotes from actual operations and example scenarios illustrate key concepts and cement a practical understanding of the red team process. You also are introduced to counter advanced persistent threat red teaming (CAPTR teaming). This is a reverse red teaming methodology aimed at specifically addressing the challenges faced from advanced persistent threats (APTs) by the organizations they target and the offensive security professionals trying to mitigate them. What You’ll Learn: Understand the challenges faced by offensive security assessments Incorporate or conduct red teaming to better mitigate cyber threats Initiate a successful engagement Get introduced to counter-APT red teaming (CAPTR) Evaluate offensive security processes.


Book
De dispositione delesseriearum mantissa algologica
Author:
Year: 1898 Publisher: Lundae Gleerup

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Algae

Listing 1 - 10 of 63 << page
of 7
>>
Sort by