相關主題
商品描述
In this book the author draws inspiration from Sun Tzu's Art of War, a work that explains conflict between nations, and he applies this to the computer security setting, examining how we should consider protecting information systems from accidents or malicious attacks.
The author first briefly introduces Sun Tzu. Then each chapter in the book takes its inspiration from an original title in The Art of War, where the author offers a general introduction to the content and then describes its application in a cybersecurity setting. These chapters cover estimates; waging war; offensive strategy; how you prepare for an attack; energy; weaknesses and strengths; the variables that need consideration before embarking on a war; how infrastructure is related to the concept of ground; attack by fire or how skilled attackers hide behind noise; and employing secret agents.
The book will be interesting for computer security researchers and professionals who would like some grounding in a security mindset.
商品描述(中文翻譯)
在本書中,作者從《孫子兵法》中汲取靈感,這部作品解釋了國家之間的衝突,並將其應用於計算機安全的環境,探討我們應該如何考慮保護資訊系統免受意外或惡意攻擊。
作者首先簡要介紹了孫子。接著,書中的每一章都以《孫子兵法》中的一個原始標題為靈感,作者提供了內容的一般介紹,然後描述其在網絡安全環境中的應用。這些章節涵蓋了估算;發動戰爭;攻擊策略;如何準備攻擊;能量;弱點與優勢;在發動戰爭之前需要考慮的變數;基礎設施與地形概念的關聯;火攻或高明的攻擊者如何隱藏在噪音背後;以及使用秘密代理。
本書將對希望建立安全思維的計算機安全研究人員和專業人士產生興趣。