Cyber adversary characterization : auditing the hacker mind /
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer system...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | Parker, Tom, 1982- |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, MA :
Syngress,
[2004]
|
Temas: | |
Acceso en línea: | Texto completo |
Ejemplares similares
-
Cyber adversary characterization : auditing the hacker mind /
Publicado: (2004) -
Cyber adversary characterization : auditing the hacker mind /
Publicado: (2004) -
Computer forensics : incident response essentials /
por: Kruse, Warren G.
Publicado: (2001) -
Computer security fundamentals /
por: Easttom, Chuck
Publicado: (2016) -
Network security : a practical approach /
por: Harrington, Jan L.
Publicado: (2005)