Cargando…

Cyber adversary characterization : auditing the hacker mind /

The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer system...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Parker, Tom, 1982-
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Rockland, MA : Syngress, [2004]
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocm56123913
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu|||unuuu
008 040810t20042004maua o 001 0 eng d
040 |a N$T  |b eng  |e pn  |c N$T  |d OCLCQ  |d YDXCP  |d OCLCQ  |d TUU  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCF  |d DKDLA  |d NLGGC  |d VVN  |d NTG  |d BMU  |d EBLCP  |d IDEBK  |d ZCU  |d MERUC  |d CCO  |d E7B  |d MHW  |d UKDOC  |d OPELS  |d U5D  |d FVL  |d B24X7  |d DEBSZ  |d OCLCQ  |d UMI  |d OCLCQ  |d COO  |d KSU  |d AZK  |d DEBBG  |d CNNOR  |d AGLDB  |d X#7  |d LIV  |d OCLCQ  |d WY@  |d U3W  |d OCLCA  |d LUE  |d STF  |d BRL  |d WRM  |d D6H  |d VTS  |d CEF  |d OCLCQ  |d INT  |d TOF  |d NRAMU  |d VT2  |d OCLCQ  |d A6Q  |d OCLCQ  |d G3B  |d LEAUB  |d DKC  |d OCLCQ  |d OL$  |d OCLCQ  |d ITD  |d OCLCQ  |d UKCRE  |d LUN  |d OCLCQ  |d INARC  |d OCLCO  |d OCLCQ  |d IOY  |d OCLCQ  |d HUL  |d COA  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCL 
019 |a 60779275  |a 62790351  |a 85854521  |a 162598622  |a 174131682  |a 181837890  |a 481627711  |a 507007971  |a 559293131  |a 606025859  |a 646719739  |a 722287456  |a 728016755  |a 765142482  |a 856952338  |a 933930901  |a 961573609  |a 962648633  |a 988539426  |a 1035655557  |a 1037444135  |a 1037715414  |a 1038664716  |a 1045521064  |a 1076307322  |a 1081269775  |a 1105719542  |a 1132923694  |a 1153522892  |a 1228592581  |a 1340077215 
020 |a 1932266631  |q (electronic bk.) 
020 |a 9781932266634  |q (electronic bk.) 
020 |a 0080476996 
020 |a 9780080476995 
020 |a 9781931836111 
020 |a 1931836116 
029 1 |a AU@  |b 000051860779 
029 1 |a AU@  |b 000053223796 
029 1 |a CHBIS  |b 005830342 
029 1 |a CHNEW  |b 001004705 
029 1 |a CHVBK  |b 168650878 
029 1 |a DEBBG  |b BV042307353 
029 1 |a DEBBG  |b BV043170910 
029 1 |a DEBBG  |b BV043968346 
029 1 |a DEBBG  |b BV044124144 
029 1 |a DEBSZ  |b 405313985 
029 1 |a DEBSZ  |b 422371920 
029 1 |a DEBSZ  |b 430396902 
029 1 |a DEBSZ  |b 449062716 
029 1 |a DEBSZ  |b 485788454 
029 1 |a GBVCP  |b 882749056 
029 1 |a NZ1  |b 11774832 
029 1 |a NZ1  |b 11942987 
035 |a (OCoLC)56123913  |z (OCoLC)60779275  |z (OCoLC)62790351  |z (OCoLC)85854521  |z (OCoLC)162598622  |z (OCoLC)174131682  |z (OCoLC)181837890  |z (OCoLC)481627711  |z (OCoLC)507007971  |z (OCoLC)559293131  |z (OCoLC)606025859  |z (OCoLC)646719739  |z (OCoLC)722287456  |z (OCoLC)728016755  |z (OCoLC)765142482  |z (OCoLC)856952338  |z (OCoLC)933930901  |z (OCoLC)961573609  |z (OCoLC)962648633  |z (OCoLC)988539426  |z (OCoLC)1035655557  |z (OCoLC)1037444135  |z (OCoLC)1037715414  |z (OCoLC)1038664716  |z (OCoLC)1045521064  |z (OCoLC)1076307322  |z (OCoLC)1081269775  |z (OCoLC)1105719542  |z (OCoLC)1132923694  |z (OCoLC)1153522892  |z (OCoLC)1228592581  |z (OCoLC)1340077215 
050 4 |a QA76.9.A25  |b C93 2004eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
084 |a 54.32  |2 bcl 
049 |a UAMI 
245 0 0 |a Cyber adversary characterization :  |b auditing the hacker mind /  |c Tom Parker [and 4 others]. 
264 1 |a Rockland, MA :  |b Syngress,  |c [2004] 
264 4 |c ©2004 
300 |a 1 online resource (xxxi, 324 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
500 |a "Your window into the cyber enemy's mind"--Cover 
500 |a Includes index. 
588 0 |a Print version record. 
505 0 |a Preliminaries; Acknowledgments; Author; Contents; Chapter 1 Introduction; Chapter 2 Theoretical Characterization Metrics; Chapter 3 Disclosure and the Cyber Food Chain; Chapter 4 Rating the Attack; Chapter 5 Asset Threat Characterization; Chapter 6 Bringing It All Together; Chapter 7 WarmTouch; Chapter 8 Managing the Insider Threat; Chapter 9 The Cyber Adversary in Groups; Chapter 10 Characterizing the Extremes; Chapter 11 Conclusions; Chapter 12 Return on Investment; Final Words; Glossary; Index. 
520 |a The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemys mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy. * This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. * This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense. * . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 1 7 |a Computerbeveiliging.  |2 gtt 
650 1 7 |a Computercriminaliteit.  |2 gtt 
700 1 |a Parker, Tom,  |d 1982-  |1 https://id.oclc.org/worldcat/entity/E39PBJcGqyTtjd7bTxbHb4xbh3 
758 |i has work:  |a Cyber adversary characterization (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGBqcWbVj77PTMtqbVGfYK  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |t Cyber adversary characterization.  |d Rockland, MA : Syngress, ©2004  |z 1931836116  |w (OCoLC)56064605 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=294071  |z Texto completo 
938 |a 123Library  |b 123L  |n 33979 
938 |a Books 24x7  |b B247  |n bks00003861 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL294071 
938 |a EBSCOhost  |b EBSC  |n 114551 
938 |a Internet Archive  |b INAR  |n cyberadversarych0000unse 
938 |a YBP Library Services  |b YANK  |n 2361878 
938 |a YBP Library Services  |b YANK  |n 2713034 
994 |a 92  |b IZTAP