買這商品的人也買了...
-
$2,180$2,071 -
$1,970$1,872 -
$480$374 -
$450$356 -
$1,890$1,796 -
$1,250$1,188 -
$420$357 -
$720$706 -
$454網絡安全測試實驗室搭建指南 (The Network Security Test Lab: A Step-by-Step Guide)
-
$390$332 -
$560$476 -
$650$585 -
$2,470$2,340 -
$520$411 -
$650$585 -
$700Cybersecurity For Dummies
-
$620$490 -
$2,100$1,995 -
$580$458 -
$1,663$1,575 -
$550$495 -
$480$480 -
$607Go 語言高級開發與實戰
-
$352Rust 編程從入門到實戰
-
$520$390
相關主題
商品描述
This is the first book of its kind to cover the unique challenges of creating, maintaining, and operating a system that operates in both outer space and cyber space. It covers the impact that cyber threats can have on space systems and how the cybersecurity industry must rise to meet the threats.
Space is one of the fastest growing military, government, and industry sectors. Because everything in today's world exists within or connected to cyberspace, there is a dire need to ensure that cybersecurity is addressed in the burgeoning field of space operations.
You will be introduced to the basic concepts involved in operating space systems that include low earth orbit (LEO), geosynchronous orbit (GEO), and others. Using the related high-level constraints, threats, and vectors, you will be able to frame a clear picture of the need and challenges of bringing cybersecurity to bear on satellites, space vehicles, and their related systems.The author, who has spent seven years in the US Marine Corps and was originally involved in satellite communications and later cyber operations, is now a seasoned cybersecurity practitioner currently implementing cybersecurity vision and strategy to a large portfolio of systems and programs, many focused specifically in space. A published academic and experienced professional, he brings a practical, real-world and tempered approach to securing space vehicles and their systems.
You will:
- Understand what constitutes a space system and the challenges unique to operations of all spacecraft
- Get introduced to various space vehicles and their unique constraints and challenges
- Be aware of the physical and cyber threats to the space vehicle and its ability to fly and orbit
- Know the physical and cyber vectors from which threats may manifest
- Study the micro- and macro-analysis provided of space system attack scenarios
- Be familiar with the high-level problems of cybersecurity in the space domain
商品描述(中文翻譯)
這是第一本涵蓋在外太空和網絡空間中創建、維護和操作系統所面臨的獨特挑戰的書籍。它探討了網絡威脅對太空系統的影響,以及網絡安全行業必須應對這些威脅的問題。
太空是最快增長的軍事、政府和工業領域之一。由於當今世界中的一切都存在於或與網絡空間相連,迫切需要確保在太空操作這一新興領域中解決網絡安全問題。
本書將介紹操作太空系統的基本概念,包括低地球軌道(LEO)、地球同步軌道(GEO)等。通過相關的高層約束、威脅和向量,您將能夠清晰地了解在衛星、太空載具及其相關系統上引入網絡安全的需求和挑戰。
作者曾在美國海軍陸戰隊服役七年,最初參與衛星通信,後來轉向網絡作戰,現在是一位經驗豐富的網絡安全從業者,目前正在將網絡安全願景和策略應用於大量的系統和計劃中,其中許多專注於太空領域。作為一位發表過學術論文且具有豐富經驗的專業人士,他以實用、現實世界和冷靜的方式來保護太空載具及其系統。
您將會:
- 了解什麼構成了太空系統以及所有航天器操作所面臨的獨特挑戰
- 介紹各種太空載具及其獨特的約束和挑戰
- 瞭解對太空載具及其飛行和軌道能力的物理和網絡威脅
- 知道威脅可能來自哪些物理和網絡向量
- 研究提供的太空系統攻擊場景的微觀和宏觀分析
- 熟悉太空領域網絡安全的高層問題
作者簡介
Dr. Jacob G. Oakley spent over seven years in the US Marines and was one of the founding members of the operational arm of the Marine Corps Forces Cyberspace Command at Ft. Meade, Maryland, leaving that unit as the senior Marine Corps operator and a division technical lead. After his enlistment he wrote and taught an advanced computer operations course, eventually returning back to mission support at Ft. Meade. He later left government contracting to do threat emulation and red teaming at a private company for commercial clients, serving as the principal penetration tester and director of penetration testing and cyber operations. He is currently working as a cyber SME for a government customer. He completed his doctorate in IT at Towson University, researching and developing offensive cybersecurity methods, and is the author of Professional Red Teaming: Conducting Successful Cybersecurity Engagements (Apress) as well as Waging Cyber War: Technical Challenges and Operational Constraints (Apress).
作者簡介(中文翻譯)
Dr. Jacob G. Oakley在美國海軍陸戰隊服役超過七年,並是海軍陸戰隊網絡空間指揮部的創始成員之一,該指揮部位於馬里蘭州的梅德堡堡,他在該單位擔任高級海軍陸戰隊操作員和部門技術負責人。在退役後,他撰寫並教授了一門高級計算機操作課程,最終返回梅德堡堡的任務支援工作。後來,他離開政府合同工作,為商業客戶進行威脅模擬和紅隊測試,擔任主要滲透測試人員和滲透測試與網絡操作總監。他目前在一家政府客戶那裡擔任網絡安全專家。他在陶森大學完成了IT博士學位,研究和開發攻擊性網絡安全方法,並撰寫了《專業紅隊測試:成功進行網絡安全合作》(Apress)和《發動網絡戰爭:技術挑戰和操作限制》(Apress)兩本書。