Este es el Blog sobre temas de Ciberdefensa propuesto por "www.darFe.es" para debates sobre aspectos de interés en este tema dentro del ámbito de España y Latinoamérica.

Todo tipo de artículo o comentario que se desee publicar puede enviarse a:  Esta dirección de correo electrónico está siendo protegida contra los robots de spam. Necesita tener JavaScript habilitado para poder verlo., una vez recibido se evaluará y si responde a las normas del foro será publicado en la categoría correspondiente.

La intención es integrar en este sitio la información de interés de los participantes, por lo que os pedimos que todo dato que creáis oportuno de tu propio país (URLs de interés, noticias, legislación, organizaciones, etc.) nos lo informéis para poder incorporarlo.

 

 Nombre

 Autor

 URL

 Imagen

OPERACIONES MILITARES CIBERNÉTICAS - Planeamiento y Ejecución en el Nivel Operacional 

Evergisto de Vergara - Gustavo Adolfo Trama

http://www.cefadigital.edu.ar/bitstream/123456789/939/1/CAVIII%20-%20OMC%20DE%20VERGARA.pdf

 

Ciberseguridad, una estrategia Informático/Militar

A.Corletti

http://www.darfe.es/joomla/index.php/component/dtracker/?filetitle=DESCARGA&filename=Libro-Ciberseguridad_Internet.pdf

 

Cyber Attacks- Protecting National Infrastructure

Edward G. Amoroso

https://www.sciencedirect.com/book/9780123849175/cyber-attacks

Cover for Cyber Attacks 

Cyber Crime and Cyber Terrorism Investigator's Handbook

Babak Akhgar, Andrew Staniforth and Francesca Bosco

https://www.sciencedirect.com/book/9780128007433/cyber-crime-and-cyber-terrorism-investigators-handbook

 

 

Cyber Guerilla

  Jelle van Haaster, Rickey Gevers and Martijn Sprengers

https://www.sciencedirect.com/book/9780128051979/cyber-guerilla

 

En Busca de un Modelo de Resiliencia Cibernética basado en las experiencias de la OTAN y su posible transferencia a América del Sur

Mariano O. Gómez

http://www.darfe.es/joomla/index.php/descargas/summary/5-ciberseguridad/1379-en-busca-de-un-modelo-de-resiliencia-cibernetica-basado-en-las-experiencias-de-la-otan-y-su-posible-transferencia-a-america-del-sur

Seguridad en Redes

 A.Corletti

http://www.darfe.es/joomla/index.php/descargas/viewdownload/5-ciberseguridad/1310-libro-seguridad-en-redes

Seguridad por Niveles

A.Corletti

http://www.darfe.es/joomla/index.php/descargas/viewdownload/5-ciberseguridad/26-libro-seguridad-por-niveles

Cyber Reconnaissance, Surveillance and Defense

Robert Shimonski, John Zenir and Allison Bishop

https://www.sciencedirect.com/book/9780128013083/cyber-reconnaissance-surveillance-and-defense

Cover for Cyber Reconnaissance, Surveillance and Defense

Cyber Security Awareness for CEOs and Management

David Willson

https://www.sciencedirect.com/book/9780128047545/cyber-security-awareness-for-ceos-and-management

Cover for Cyber Security Awareness for CEOs and Management

Cyber-Physical Systems of Systems

Andrea Bondavalli, Sara Bouchenak, Hermann Kopetz

https://link.springer.com/book/10.1007/978-3-319-47590-5

Cyberbullying: Where Are We Now? A Cross-National Understanding

Conor Mc Guckin and Lucie Corcoran

https://www.mdpi.com/books/pdfview/book/248

Cyberbullying: Where Are We Now? A Cross-National Understanding

Cybersecurity and Applied Mathematics

Leigh Metcalf and William Casey

https://www.sciencedirect.com/book/9780128044520/cybersecurity-and-applied-mathematics

Cover for Cybersecurity and Applied Mathematics

How to Define and Build an Effective Cyber Threat Intelligence Capability

Henry Dalziel

https://www.sciencedirect.com/book/9780128027301/how-to-define-and-build-an-effective-cyber-threat-intelligence-capability

Cover for How to Define and Build an Effective Cyber Threat Intelligence Capability

Introduction to US Cybersecurity Careers

Henry Dalzie 

https://www.sciencedirect.com/book/9780128027226/introduction-to-us-cybersecurity-careers

Cover for Introduction to US Cybersecurity Careers 

Targeted Cyber Attacks - Multi-staged Attacks Driven by Exploits and Malware

 

Aditya K Sood and Richard Enbody 

 https://www.sciencedirect.com/book/9780128006047/targeted-cyber-attacks

 Cover for Targeted Cyber Attacks

 

Analyzing Social Media Networks with NodeXL

Derek L. Hansen, Ben Shneiderman and Marc A. 

https://www.sciencedirect.com/book/9780123822291/analyzing-social-media-networks-with-nodexl

 Cover for Analyzing Social Media Networks with NodeXL

Applied Network Security Monitoring- Collection, Detection, and Analysis

Chris Sanders and Jason Smith

https://www.sciencedirect.com/book/9780124172081/applied-network-security-monitoring

Cover for Applied Network Security Monitoring

Architecture of Network Systems

Dimitrios Serpanos and Tilman Wolf

https://www.sciencedirect.com/book/9780123744944/architecture-of-network-systems

Cover for Architecture of Network Systems

Cloud Networking- Developing Cloud-Based Data Center Networks

Gary Lee

https://www.sciencedirect.com/book/9780128007280/cloud-networking

Cover for Cloud Networking

Computational Network Science- An Algorithmic Approach

Henry Hexmoor

https://www.sciencedirect.com/book/9780128008911/computational-network-science

Cover for Computational Network Science

Industrial Network Security- Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

Eric Knapp

https://www.sciencedirect.com/book/9781597496452/industrial-network-security

Cover for Industrial Network Security

Joint RES and Distribution Network Expansion Planning Under a Demand Response Framework

Javier Contreras, Miguel Asensio, Sergio Montoya-Bueno

https://www.sciencedirect.com/book/9780128053225/joint-res-and-distribution-network-expansion-planning-under-a-demand-response-framework

Cover for Joint RES and Distribution Network Expansion Planning Under a Demand Response Framework

Malware Diffusion Models for Modern Complex Networks

Vasileios Karyotis and M.H.R. Khouzani

https://www.sciencedirect.com/book/9780128027141/malware-diffusion-models-for-modern-complex-networks

Cover for Malware Diffusion Models for Modern Complex Networks

Modeling and Simulation of Computer Networks and Systems

Mohammad S. Obaidat, Petros Nicopolitidis and Faouzi Zarai

https://www.sciencedirect.com/book/9780128008874/modeling-and-simulation-of-computer-networks-and-systems

Cover for Modeling and Simulation of Computer Networks and Systems

Network Performance and Security- Testing and Analyzing Using Open Source and Low-Cost Tools

Chris Chapman

https://www.sciencedirect.com/book/9780128035849/network-performance-and-security

Cover for Network Performance and Security

Networks-on-Chip- From Implementations to Programming Paradigms

Zhiying Wang

https://www.sciencedirect.com/book/9780128009796/networks-on-chip

Cover for Networks-on-Chip

2019 - 11th International Conference on Cyber Conflict: Silent Battle

 T. Minárik, S. Alatalu, S. Biondi, M. Signoretti, I. Tolga, G. Visky (Eds.)

 https://www.nisc.go.jp/eng/pdf/cs-strategy2018-en-booklet.pdf

 

2018- 10th International Conference on Cyber Conflict CyCon X: Maximising Effects

 T. Minárik, R. Jakschis, L. Lindström (Eds.)

 https://ccdcoe.org/uploads/2018/10/CyCon_2018_Full_Book.pdf

 

2017 - 9th International Conference on Cyber Conflict: Defending the Core

 H. Rõigas, R. Jakschis, L. Lindström, T. Minárik (Eds.)

 https://ccdcoe.org/uploads/2018/10/CyCon_2017_book.pdf

 

2016 - 8th International Conference on Cyber Conflict: Cyber Power

N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.)

https://ccdcoe.org/uploads/2018/10/CyCon_2016_book.pdf

 

International Cyber Norms Legal, Policy & Industry Perspectives

Anna-Maria Osula and Henry Rõigas (Eds.)

https://ccdcoe.org/uploads/2018/10/InternationalCyberNorms_full_book.pdf

 

Insider Threat Detection Study

Markus Kont, Mauno Pihelgas, Jesse Wojtkowiak, Lorena Trinberg, Anna-Maria Osula

https://ccdcoe.org/uploads/2018/10/Insider_Threat_Study_CCDCOE.pdf

 

Cyber War in Perspective: Russian Aggression Against Ukraine

Kenneth Geers

https://ccdcoe.org/uploads/2018/10/CyberWarinPerspective_full_book.pdf

 

2015 - 7th International Conference on Cyber Conflict: Architectures in Cyberspace

M.Maybaum, A.-M.Osula, L.Lindström (Eds.)

https://ccdcoe.org/uploads/2018/10/CyCon_2015_book.pdf

 

2014 - 6th International Conference on Cyber Conflict

P. Branguetto, M. Maybaum, J Stinissen

https://ccdcoe.org/uploads/2018/10/CyCon_2014.pdf

 

Peacetime Regime For State Activities in Cyberspace

Katharina Ziolkowski

https://ccdcoe.org/uploads/2018/10/PeacetimeRegime.pdf

 

1st Workshop on Ethics of Cyber Conflict: Proceedings

Ludovica Glorioso, Anna-Maria Osula (Eds.)

https://ccdcoe.org/uploads/2018/10/2013ethics-workshop-proceedings.pdf

 

2013 - 5th International Conference on Cyber Conflict

K. Poddins, M. Maybaum, J Stinissen

https://ccdcoe.org/uploads/2018/10/CyCon_2013_Proceedings.pdf

 

2012 - 4th International Conference on Cyber Conflict

C. Czosseck, R. Ottis, K. Ziolkowski (Eds.)

https://ccdcoe.org/uploads/2019/03/CyCon_book_2012.pdf

 

Frameworks for International Cyber Security

Eneken Tikk

https://ccdcoe.org/uploads/2018/10/FICS2.pdf

 

Cyber Wars: A Paradigm Shift from Means to Ends

Amit SHARMA

https://ccdcoe.org/uploads/2018/10/00_VirtualBattlefield.pdf

 

Conference on Cyber Conflict Proceedings 2010

Christian Czosseck and Karlis Podins

 https://ccdcoe.org/uploads/2018/10/1_Proceedings2010FullBook.pdf

 

Internatinal Cyber Incidentes - Legal and Policy Proceedings 2010

Eneken Tikk, Anna Maria Taliharm

https://ccdcoe.org/uploads/2010/01/LP_Proceedings_2010-2.pdf

 

Internatinal Cyber Incidentes - Legal Considerations

Eneken Tikk, Kadri Kaska, Liis Vihul 

 https://ccdcoe.org/uploads/2018/10/legalconsiderations_0.pdf