LEADER 01363nam--2200373---450- 001 990003630470203316 005 20120228095823.0 010 $a2-05-100221-5 035 $a000363047 035 $aUSA01000363047 035 $a(ALEPH)000363047USA01 035 $a000363047 100 $a20120228d1980----km-y0itay50------ba 101 0 $afre 102 $aFR 105 $a||||||||001yy 200 1 $a<> vocabulaire du sentiment dans l'?uvre de J.-J. Rousseau$fsous la direction de Michel Gilot et Jean Sgard par Marie-Therese Bourez ... [et al.] 210 $aGeneve$aParis$cSlatkine$d1980 215 $a473 p.$d22 cm 225 2 $aÉtudes rousseauistes et index des oeuvres de J.-J. Rousseau. Sér. A, Champs sémantiques$v3 410 0$12001$aÉtudes rousseauistes et index des oeuvres de J.-J. Rousseau. Sér. A, Champs sémantiques$v3 600 1$aRousseau,$bJean Jacques <1712-1778>$2BNCF 676 $a194 702 1$aGILOT,$bMichel 702 1$aSGARD,$bJean 702 1$aBOUREZ,$bMarie-Therese 801 0$aIT$bsalbc$gISBD 912 $a990003630470203316 951 $aII.1.C. 2099$b235093 L.M.$cII.1.C.$d00307542$dUMA 959 $aBK 979 $aPASSARO$b90$c20120228$lUSA01$h0954 979 $aPASSARO$b90$c20120228$lUSA01$h0958 996 $aVocabulaire du sentiment dans l'?uvre de J.-J. Rousseau$91138307 997 $aUNISA LEADER 03649oam 2200541Mn 450 001 9911020247903321 005 20251007215257.0 010 $a1394334621 010 $a9781394334629 010 $a1394334648 010 $a9781394334643 010 $z1394334613$b(hardcover) 010 $z9781394334612$b(hardcover) 035 $a(CKB)39711080900041 035 $a(CaSebORM)9781394334612 035 $a(OCoLC)1528906718 035 $a(OCoLC-P)1528906718 035 $a(MiAaPQ)EBC32252573 035 $a(Au-PeEL)EBL32252573 035 $a(OCoLC)1528984859 035 $a(BIP)119692721 035 $a(BIP)119371510 035 $a(EXLCZ)9939711080900041 100 $a20250725d2025 uy 0 101 0 $aeng 135 $aur|n#|||a|||a 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aCyber recon $emy life in cyber espionage and ransomware negotiation /$fKurtis Minder 210 1$aHoboken, New Jersey :$cJohn Wiley & Songs, Inc.,$d[2025] 215 $a1 online resource 311 08$a1-394-33461-3 330 $aAn up close and personal look at cyber espionage and digital spycraft In Cyber Recon: My Life in Cyber Espionage and Ransomware Negotiation, 30-year cybersecurity veteran Kurtis Minder delivers a fascinating exploration of real-world cyber espionage in some of the most dangerous places on the Internet. Through his experiences watching and hunting cybercriminals as varied as lone wolfs, the Russian mafia, and other official and unofficial nation-state hackers, he explains how cyber espionage is performed, the tools and skills that people like him use all the time, and the consequences of engaging with cybercriminals on a daily basis. Kurtis teaches you that the same operational security that keeps him and his team of spies safe will keep you and your organization's secrets safer too. And you'll explore whether fake personas on the internet are always bad or are there legitimate business uses for Romanian speaking sock puppets? You'll also discover critical lessons that Minder has learned as he's led his digital risk company, GroupSense, through many of the most dramatic incidents of online crime of the last few decades. Inside the book: Original profiles of cyber espionage and negotiation professionals so you're learning from Jax Scott, Jon DiMaggio, Jason Ingalls, Beau Woods, Brye Ravattine and many more, with QR-code links to extended YouTube interviews An original, non-technical primer on the people that populate the cyber risk landscape and the methods they use to carry out attacks Steps to avoid becoming a target of Lockbit, BlackMatter, NotPetya, and next year's most dangerous ransomware as well as how to minimize the business damage when you are a victim How the intersection of business negotiation and hostage negotiation relates to high-stakes ransomware negotiations The fast-moving transformation generative AI is unleashing in cyber attacks and defense An inside look at an endlessly interesting corner of the field of cybersecurity, Cyber Recon is also a must-read for anyone interested in spycraft, technology, hacking, or digital entrepreneurship. 606 $aComputer crimes 606 $aCyber intelligence (Computer security) 606 $aInternet in espionage 615 0$aComputer crimes. 615 0$aCyber intelligence (Computer security) 615 0$aInternet in espionage. 676 $a005.8 700 $aMinder$b Kurtis$01842399 801 0$bOCoLC-P 801 1$bOCoLC-P 906 $aBOOK 912 $a9911020247903321 996 $aCyber Recon$94422488 997 $aUNINA