LEADER 03650nam a2200409Ii 4500 001 991003255239707536 006 m d 007 cr cn||||||||| 008 070806s2004 maua s 001 0 eng d 020 $a9781931836111 020 $a1931836116 035 $ab13656235-39ule_inst 037 $a106156:106187$bElsevier Science & Technology$nhttp://www.sciencedirect.com 040 $aOPELS$cOPELS 049 $aTEFA 082 04$a005.8$222 245 00$aCyber adversary characterization$h[electronic resource] :$bauditing the hacker mind /$cTom Parker ... [et al. ; foreword by Jeff Moss]. 260 $aRockland, MA :$bSyngress,$cc2004. 300 $axxxi, 324 p. :$bill. ;$c24 cm. 500 $a"Your window into the cyber enemy's mind"--Cover. 500 $aIncludes index. 520 $aThe wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemys mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy. * This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. * This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense. * . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face. 533 $aElectronic reproduction.$bAmsterdam :$cElsevier Science & Technology,$d2007.$nMode of access: World Wide Web.$nSystem requirements: Web browser.$nTitle from title screen (viewed on Aug. 2, 2007).$nAccess may be restricted to users at subscribing institutions. 650 0$aComputer security. 650 0$aComputer networks$xSecurity measures. 650 17$aComputerbeveiliging.$2gtt 650 17$aComputercriminaliteit.$2gtt 655 7$aElectronic books.$2local 700 1 $aParker, Tom,$d1982-$eauthor$4http://id.loc.gov/vocabulary/relators/aut$0739075 776 1 $cOriginal$z1931836116$z9781931836111$w(OCoLC)56064605 856 40$3Referex$uhttp://www.sciencedirect.com/science/book/9781931836111$zAn electronic book accessible through the World Wide Web; click for information 907 $a.b13656235$b24-02-22$c24-01-08 912 $a991003255239707536 994 $aC0$bTEF 996 $aCyber adversary characterization$91464025 997 $aUNISALENTO 998 $ale029$b24-01-08$cm$dm $e-$feng$gmau$h0$i0