Cyber adversary characterization : auditing the hacker mind /
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer system...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | Parker, Tom, 1982- |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Rockland, MA :
Syngress,
[2004]
|
Temas: | |
Acceso en línea: | Texto completo |
Ejemplares similares
-
Security and resilience in intelligent data-centric systems and communication networks /
Publicado: (2018) -
Data breach preparation and response : breaches are certain, impact is not /
por: Fowler, Kevvie
Publicado: (2016) -
Information security best practices : 205 basic rules /
por: Stefanek, George L.
Publicado: (2002) -
How to cheat at securing your network /
Publicado: (2007) -
Hack proofing your network /
Publicado: (2002)