Kids Library Home

Welcome to the Kids' Library!

Search for books, movies, music, magazines, and more.

     
Available items only
E-Book/E-Doc

Title Cyber adversary characterization : auditing the hacker mind / Tom Parker [and 4 others].

Publication Info. Rockland, MA : Syngress, [2004]
©2004

Copies

Location Call No. OPAC Message Status
 Axe Elsevier ScienceDirect Ebook  Electronic Book    ---  Available
Description 1 online resource (xxxi, 324 pages) : illustrations
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
data file
Note "Your window into the cyber enemy's mind"--Cover
Includes index.
Print version record.
Contents Preliminaries; Acknowledgments; Author; Contents; Chapter 1 Introduction; Chapter 2 Theoretical Characterization Metrics; Chapter 3 Disclosure and the Cyber Food Chain; Chapter 4 Rating the Attack; Chapter 5 Asset Threat Characterization; Chapter 6 Bringing It All Together; Chapter 7 WarmTouch; Chapter 8 Managing the Insider Threat; Chapter 9 The Cyber Adversary in Groups; Chapter 10 Characterizing the Extremes; Chapter 11 Conclusions; Chapter 12 Return on Investment; Final Words; Glossary; Index.
Summary The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemys mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy. * This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. * This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense. * . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face
Subject Computer security.
Computer networks -- Security measures.
Computer Security
Sécurité informatique.
Réseaux d'ordinateurs -- Sécurité -- Mesures.
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Computer networks -- Security measures
Computer security
Computerbeveiliging.
Computercriminaliteit.
Added Author Parker, Tom, 1982-
Other Form: Print version: Cyber adversary characterization. Rockland, MA : Syngress, ©2004 1931836116 (OCoLC)56064605
ISBN 1932266631 (electronic bk.)
9781932266634 (electronic bk.)
0080476996
9780080476995
9781931836111
1931836116
Standard No. AU@ 000051860779
AU@ 000053223796
CHBIS 005830342
CHNEW 001004705
CHVBK 168650878
DEBBG BV042307353
DEBBG BV043170910
DEBBG BV043968346
DEBBG BV044124144
DEBSZ 405313985
DEBSZ 422371920
DEBSZ 430396902
DEBSZ 449062716
DEBSZ 485788454
GBVCP 882749056
NZ1 11774832
NZ1 11942987

 
    
Available items only