LEADER 02199nam 2200553 450 001 9910788738703321 005 20170822144149.0 010 $a1-4704-0265-3 035 $a(CKB)3360000000464858 035 $a(EBL)3114369 035 $a(SSID)ssj0000888754 035 $a(PQKBManifestationID)11455658 035 $a(PQKBTitleCode)TC0000888754 035 $a(PQKBWorkID)10867684 035 $a(PQKB)11029202 035 $a(MiAaPQ)EBC3114369 035 $a(RPAM)1685809 035 $a(PPN)195415582 035 $a(EXLCZ)993360000000464858 100 $a19990427d1999 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aA1 subgroups of exceptional algebraic groups /$fR. Lawther, D.M. Testerman 210 1$aProvidence, Rhode Island :$cAmerican Mathematical Society,$d1999. 215 $a1 online resource (146 p.) 225 1 $aMemoirs of the American Mathematical Society,$x0065-9266 ;$vnumber 674 300 $a"September 1999, volume 141, number 674 (end of volume)." 311 $a0-8218-1966-6 320 $aIncludes bibliographical references (pages 130-131). 327 $a""Contents""; ""1. Introduction""; ""2. Labelled Diagrams""; ""3. Essential Embeddings""; ""4. Unipotent Classes""; ""5. Centralizers""; ""6. Results""; ""7. (Aut G)-conjugacy""; ""Tables of A[sub(1)] subgroups""; ""Table 1. A[sub(1)] subgroups of G[sub(2)]""; ""Table 2. A[sub(1)] subgroups of F[sub(4)]""; ""Table 3. A[sub(1)] subgroups of E[sub(6)]""; ""Table 4. A[sub(1)] subgroups of E[sub(7)]""; ""Table 5. A[sub(1)] subgroups of E[sub(8)]""; ""References"" 410 0$aMemoirs of the American Mathematical Society ;$vno. 674. 606 $aLinear algebraic groups 606 $aLie algebras 615 0$aLinear algebraic groups. 615 0$aLie algebras. 676 $a510 s 676 $a512/.5 700 $aLawther$b R$g(Ross),$f1960-$01542820 702 $aTesterman$b Donna M.$f1960- 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910788738703321 996 $aA1 subgroups of exceptional algebraic groups$93861824 997 $aUNINA LEADER 03649oam 2200541Mn 450 001 9911020247903321 005 20251007215257.0 010 $a1394334621 010 $a9781394334629 010 $a1394334648 010 $a9781394334643 010 $z1394334613$b(hardcover) 010 $z9781394334612$b(hardcover) 035 $a(CKB)39711080900041 035 $a(CaSebORM)9781394334612 035 $a(OCoLC)1528906718 035 $a(OCoLC-P)1528906718 035 $a(MiAaPQ)EBC32252573 035 $a(Au-PeEL)EBL32252573 035 $a(OCoLC)1528984859 035 $a(BIP)119692721 035 $a(BIP)119371510 035 $a(EXLCZ)9939711080900041 100 $a20250725d2025 uy 0 101 0 $aeng 135 $aur|n#|||a|||a 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber recon $emy life in cyber espionage and ransomware negotiation /$fKurtis Minder 210 1$aHoboken, New Jersey :$cJohn Wiley & Songs, Inc.,$d[2025] 215 $a1 online resource 311 08$a1-394-33461-3 330 $aAn up close and personal look at cyber espionage and digital spycraft In Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation, 30-year cybersecurity veteran Kurtis Minder delivers a fascinating exploration of real-world cyber espionage in some of the most dangerous places on the Internet. Through his experiences watching and hunting cybercriminals as varied as lone wolfs, the Russian mafia, and other official and unofficial nation-state hackers, he explains how cyber espionage is performed, the tools and skills that people like him use all the time, and the consequences of engaging with cybercriminals on a daily basis. Kurtis teaches you that the same operational security that keeps him and his team of spies safe will keep you and your organization's secrets safer too. And you'll explore whether fake personas on the internet are always bad or are there legitimate business uses for Romanian speaking sock puppets? You'll also discover critical lessons that Minder has learned as he's led his digital risk company, GroupSense, through many of the most dramatic incidents of online crime of the last few decades. Inside the book: Original profiles of cyber espionage and negotiation professionals so you're learning from Jax Scott, Jon DiMaggio, Jason Ingalls, Beau Woods, Brye Ravattine and many more, with QR-code links to extended YouTube interviews An original, non-technical primer on the people that populate the cyber risk landscape and the methods they use to carry out attacks Steps to avoid becoming a target of Lockbit, BlackMatter, NotPetya, and next year's most dangerous ransomware as well as how to minimize the business damage when you are a victim How the intersection of business negotiation and hostage negotiation relates to high-stakes ransomware negotiations The fast-moving transformation generative AI is unleashing in cyber attacks and defense An inside look at an endlessly interesting corner of the field of cybersecurity, Cyber Recon is also a must-read for anyone interested in spycraft, technology, hacking, or digital entrepreneurship. 606 $aComputer crimes 606 $aCyber intelligence (Computer security) 606 $aInternet in espionage 615 0$aComputer crimes. 615 0$aCyber intelligence (Computer security) 615 0$aInternet in espionage. 676 $a005.8 700 $aMinder$b Kurtis$01842399 801 0$bOCoLC-P 801 1$bOCoLC-P 906 $aBOOK 912 $a9911020247903321 996 $aCyber Recon$94422488 997 $aUNINA