126,08 €
140,09 €
-10% with code: EXTRA
Cyber Adversary Characterization
Cyber Adversary Characterization
126,08
140,09 €
  • We will send in 10–14 business days.
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it…
140.09
  • Publisher:
  • ISBN-10: 1931836116
  • ISBN-13: 9781931836111
  • Format: 17.7 x 23.3 x 2.3 cm, minkšti viršeliai
  • Language: English
  • SAVE -10% with code: EXTRA

Cyber Adversary Characterization (e-book) (used book) | bookbook.eu

Reviews

(3.50 Goodreads rating)

Description

The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? Inside the Mind of a Criminal Hacker sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy's mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.

EXTRA 10 % discount with code: EXTRA

126,08
140,09 €
We will send in 10–14 business days.

The promotion ends in 23d.20:28:20

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,40 Book Euros!?
  • Author: Tom Parker
  • Publisher:
  • ISBN-10: 1931836116
  • ISBN-13: 9781931836111
  • Format: 17.7 x 23.3 x 2.3 cm, minkšti viršeliai
  • Language: English English

The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? Inside the Mind of a Criminal Hacker sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy's mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)