000914478 000__ 03376cam\a2200445Ia\4500 000914478 001__ 914478 000914478 005__ 20230306150353.0 000914478 006__ m\\\\\o\\d\\\\\\\\ 000914478 007__ cr\un\nnnunnun 000914478 008__ 190907s2019\\\\sz\\\\\\o\\\\\000\0\eng\d 000914478 019__ $$a1121272006 000914478 020__ $$a9783030285692 000914478 020__ $$a3030285693 000914478 020__ $$z9783030285685 000914478 0247_ $$a10.1007/978-3-030-28 000914478 035__ $$aSP(OCoLC)on1117641660 000914478 035__ $$aSP(OCoLC)1117641660$$z(OCoLC)1121272006 000914478 040__ $$aEBLCP$$beng$$cEBLCP$$dGW5XE$$dLQU$$dOCLCF 000914478 049__ $$aISEA 000914478 050_4 $$aQA76.9.A25 000914478 08204 $$a005.8$$223 000914478 1001_ $$aMadsen, Tom. 000914478 24514 $$aThe art of war for computer security /$$cTom Madsen. 000914478 260__ $$aCham :$$bSpringer,$$c2019. 000914478 300__ $$a1 online resource (62 pages) 000914478 336__ $$atext$$btxt$$2rdacontent 000914478 337__ $$acomputer$$bc$$2rdamedia 000914478 338__ $$aonline resource$$bcr$$2rdacarrier 000914478 5050_ $$aIntro; Preface; Overview of Chapters; Contents; Who Was Sun Tzu?; Sun Tzu; Why Sun Tzu?; WhatÅ› Next?; Estimates; Employees; During a Crisis; Company Resiliency; Technology; Quotes; Final Remarks; Next Steps; Governance; Waging War; Processes or Procedures?; Staff; Quotes; Final Remarks; Offensive Strategy; Threat Assessment; Risk Assessment; Quotes; Final Remarks; Dispositions; Quotes; Final Remarks; Energy; Resource Management; Quotes; Final Remarks; Weaknesses and Strengths; Weaknesses; Strengths; Quotes; Final Remarks; The Nine Variables; Planning; Quotes; Final Remarks 000914478 5058_ $$aThe Nine Varieties of GroundQuotes; Final Remarks; Attack by Fire; Quotes; Final Remarks; Employment of Secret Agents; Quotes; Final Remarks; The Final Word; Governance; Risks; Threats; Final Remarks; Appendix: Center for Internet Security Critical Security Controls; Basic CIS Controls; Foundational CIS Controls; Organizational CIS Controls 000914478 506__ $$aAccess limited to authorized users. 000914478 520__ $$aIn this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks. The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an original title in The Art of War, where the author offers a general introduction to the content and then describes its application in a cybersecurity setting. These chapters cover estimates; waging war; offensive strategy; how you prepare for an attack; energy; weaknesses and strengths; the variables that need consideration before embarking on a war; how infrastructure is related to the concept of ground; attack by fire or how skilled attackers hide behind noise; and employing secret agents. The book will be interesting for computer security researchers and professionals who would like some grounding in a security mindset. 000914478 588__ $$aDescription based on print version record. 000914478 60000 $$aSunzi,$$dactive 6th century B.C.$$tSunzi bing fa. 000914478 650_0 $$aComputer security. 000914478 77608 $$iPrint version:$$aMadsen, Tom$$tThe Art of War for Computer Security$$dCham : Springer,c2019$$z9783030285685 000914478 852__ $$bebk 000914478 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-030-28569-2$$zOnline Access$$91397441.1 000914478 909CO $$ooai:library.usi.edu:914478$$pGLOBAL_SET 000914478 980__ $$aEBOOK 000914478 980__ $$aBIB 000914478 982__ $$aEbook 000914478 983__ $$aOnline 000914478 994__ $$a92$$bISE