Cyber adversary characterization : auditing the hacker mind /
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer system...
Call Number: | Libro Electrónico |
---|---|
Other Authors: | Parker, Tom, 1982- |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Rockland, MA :
Syngress,
[2004]
|
Subjects: | |
Online Access: | Texto completo |
Similar Items
Similar Items
-
Security and resilience in intelligent data-centric systems and communication networks /
Published: (2018) -
Data breach preparation and response : breaches are certain, impact is not /
by: Fowler, Kevvie
Published: (2016) -
Information security best practices : 205 basic rules /
by: Stefanek, George L.
Published: (2002) -
How to cheat at securing your network /
Published: (2007) -
Hack proofing your network /
Published: (2002)