Cyber adversary characterization :: auditing the hacker mind /
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer system...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress,
[2004]
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemys mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy. * This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. * This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense. * . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face |
Beschreibung: | "Your window into the cyber enemy's mind"--Cover Includes index. |
Beschreibung: | 1 online resource (xxxi, 324 pages) : illustrations |
ISBN: | 1932266631 9781932266634 0080476996 9780080476995 9781931836111 1931836116 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm56123913 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu|||unuuu | ||
008 | 040810t20042004maua o 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d OCLCQ |d YDXCP |d OCLCQ |d TUU |d OCLCQ |d OCLCO |d OCLCQ |d OCLCF |d DKDLA |d NLGGC |d VVN |d NTG |d BMU |d EBLCP |d IDEBK |d ZCU |d MERUC |d CCO |d E7B |d MHW |d UKDOC |d OPELS |d U5D |d FVL |d B24X7 |d DEBSZ |d OCLCQ |d UMI |d OCLCQ |d COO |d KSU |d AZK |d DEBBG |d CNNOR |d AGLDB |d X#7 |d LIV |d OCLCQ |d WY@ |d U3W |d OCLCA |d LUE |d STF |d BRL |d WRM |d D6H |d VTS |d CEF |d OCLCQ |d INT |d TOF |d NRAMU |d VT2 |d OCLCQ |d A6Q |d OCLCQ |d G3B |d LEAUB |d DKC |d OCLCQ |d OL$ |d OCLCQ |d ITD |d OCLCQ |d UKCRE |d LUN |d OCLCQ |d INARC |d OCLCO |d OCLCQ |d IOY |d OCLCQ |d HUL |d COA |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL |d SXB |d OCLCQ | ||
019 | |a 60779275 |a 62790351 |a 85854521 |a 162598622 |a 174131682 |a 181837890 |a 481627711 |a 507007971 |a 559293131 |a 606025859 |a 646719739 |a 722287456 |a 728016755 |a 765142482 |a 856952338 |a 933930901 |a 961573609 |a 962648633 |a 988539426 |a 1035655557 |a 1037444135 |a 1037715414 |a 1038664716 |a 1045521064 |a 1076307322 |a 1081269775 |a 1105719542 |a 1132923694 |a 1153522892 |a 1228592581 |a 1340077215 | ||
020 | |a 1932266631 |q (electronic bk.) | ||
020 | |a 9781932266634 |q (electronic bk.) | ||
020 | |a 0080476996 | ||
020 | |a 9780080476995 | ||
020 | |a 9781931836111 | ||
020 | |a 1931836116 | ||
035 | |a (OCoLC)56123913 |z (OCoLC)60779275 |z (OCoLC)62790351 |z (OCoLC)85854521 |z (OCoLC)162598622 |z (OCoLC)174131682 |z (OCoLC)181837890 |z (OCoLC)481627711 |z (OCoLC)507007971 |z (OCoLC)559293131 |z (OCoLC)606025859 |z (OCoLC)646719739 |z (OCoLC)722287456 |z (OCoLC)728016755 |z (OCoLC)765142482 |z (OCoLC)856952338 |z (OCoLC)933930901 |z (OCoLC)961573609 |z (OCoLC)962648633 |z (OCoLC)988539426 |z (OCoLC)1035655557 |z (OCoLC)1037444135 |z (OCoLC)1037715414 |z (OCoLC)1038664716 |z (OCoLC)1045521064 |z (OCoLC)1076307322 |z (OCoLC)1081269775 |z (OCoLC)1105719542 |z (OCoLC)1132923694 |z (OCoLC)1153522892 |z (OCoLC)1228592581 |z (OCoLC)1340077215 | ||
050 | 4 | |a QA76.9.A25 |b C93 2004eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
084 | |a 54.32 |2 bcl | ||
049 | |a MAIN | ||
245 | 0 | 0 | |a Cyber adversary characterization : |b auditing the hacker mind / |c Tom Parker [and 4 others]. |
264 | 1 | |a Rockland, MA : |b Syngress, |c [2004] | |
264 | 4 | |c ©2004 | |
300 | |a 1 online resource (xxxi, 324 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
500 | |a "Your window into the cyber enemy's mind"--Cover | ||
500 | |a Includes index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Preliminaries; Acknowledgments; Author; Contents; Chapter 1 Introduction; Chapter 2 Theoretical Characterization Metrics; Chapter 3 Disclosure and the Cyber Food Chain; Chapter 4 Rating the Attack; Chapter 5 Asset Threat Characterization; Chapter 6 Bringing It All Together; Chapter 7 WarmTouch; Chapter 8 Managing the Insider Threat; Chapter 9 The Cyber Adversary in Groups; Chapter 10 Characterizing the Extremes; Chapter 11 Conclusions; Chapter 12 Return on Investment; Final Words; Glossary; Index. | |
520 | |a The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemys mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy. * This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. * This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense. * . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 1 | 7 | |a Computerbeveiliging. |2 gtt |
650 | 1 | 7 | |a Computercriminaliteit. |2 gtt |
700 | 1 | |a Parker, Tom, |d 1982- |1 https://id.oclc.org/worldcat/entity/E39PBJcGqyTtjd7bTxbHb4xbh3 |0 http://id.loc.gov/authorities/names/no2004092596 | |
758 | |i has work: |a Cyber adversary characterization (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGBqcWbVj77PTMtqbVGfYK |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Cyber adversary characterization. |d Rockland, MA : Syngress, ©2004 |z 1931836116 |w (OCoLC)56064605 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781931836111 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=114551 |3 Volltext |
938 | |a 123Library |b 123L |n 33979 | ||
938 | |a Books 24x7 |b B247 |n bks00003861 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL294071 | ||
938 | |a EBSCOhost |b EBSC |n 114551 | ||
938 | |a Internet Archive |b INAR |n cyberadversarych0000unse | ||
938 | |a YBP Library Services |b YANK |n 2361878 | ||
938 | |a YBP Library Services |b YANK |n 2713034 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm56123913 |
---|---|
_version_ | 1816881617122099200 |
adam_text | |
any_adam_object | |
author2 | Parker, Tom, 1982- |
author2_role | |
author2_variant | t p tp |
author_GND | http://id.loc.gov/authorities/names/no2004092596 |
author_facet | Parker, Tom, 1982- |
author_sort | Parker, Tom, 1982- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 C93 2004eb |
callnumber-search | QA76.9.A25 C93 2004eb |
callnumber-sort | QA 276.9 A25 C93 42004EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Preliminaries; Acknowledgments; Author; Contents; Chapter 1 Introduction; Chapter 2 Theoretical Characterization Metrics; Chapter 3 Disclosure and the Cyber Food Chain; Chapter 4 Rating the Attack; Chapter 5 Asset Threat Characterization; Chapter 6 Bringing It All Together; Chapter 7 WarmTouch; Chapter 8 Managing the Insider Threat; Chapter 9 The Cyber Adversary in Groups; Chapter 10 Characterizing the Extremes; Chapter 11 Conclusions; Chapter 12 Return on Investment; Final Words; Glossary; Index. |
ctrlnum | (OCoLC)56123913 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06656cam a2200745 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm56123913 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu|||unuuu</controlfield><controlfield tag="008">040810t20042004maua o 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TUU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">DKDLA</subfield><subfield code="d">NLGGC</subfield><subfield code="d">VVN</subfield><subfield code="d">NTG</subfield><subfield code="d">BMU</subfield><subfield code="d">EBLCP</subfield><subfield code="d">IDEBK</subfield><subfield code="d">ZCU</subfield><subfield code="d">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">MHW</subfield><subfield code="d">UKDOC</subfield><subfield code="d">OPELS</subfield><subfield code="d">U5D</subfield><subfield code="d">FVL</subfield><subfield code="d">B24X7</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UMI</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">KSU</subfield><subfield code="d">AZK</subfield><subfield code="d">DEBBG</subfield><subfield code="d">CNNOR</subfield><subfield code="d">AGLDB</subfield><subfield code="d">X#7</subfield><subfield code="d">LIV</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WY@</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">LUE</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INT</subfield><subfield code="d">TOF</subfield><subfield code="d">NRAMU</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">G3B</subfield><subfield code="d">LEAUB</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OL$</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ITD</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKCRE</subfield><subfield code="d">LUN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">INARC</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IOY</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">HUL</subfield><subfield code="d">COA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">60779275</subfield><subfield code="a">62790351</subfield><subfield code="a">85854521</subfield><subfield code="a">162598622</subfield><subfield code="a">174131682</subfield><subfield code="a">181837890</subfield><subfield code="a">481627711</subfield><subfield code="a">507007971</subfield><subfield code="a">559293131</subfield><subfield code="a">606025859</subfield><subfield code="a">646719739</subfield><subfield code="a">722287456</subfield><subfield code="a">728016755</subfield><subfield code="a">765142482</subfield><subfield code="a">856952338</subfield><subfield code="a">933930901</subfield><subfield code="a">961573609</subfield><subfield code="a">962648633</subfield><subfield code="a">988539426</subfield><subfield code="a">1035655557</subfield><subfield code="a">1037444135</subfield><subfield code="a">1037715414</subfield><subfield code="a">1038664716</subfield><subfield code="a">1045521064</subfield><subfield code="a">1076307322</subfield><subfield code="a">1081269775</subfield><subfield code="a">1105719542</subfield><subfield code="a">1132923694</subfield><subfield code="a">1153522892</subfield><subfield code="a">1228592581</subfield><subfield code="a">1340077215</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1932266631</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781932266634</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080476996</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080476995</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781931836111</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1931836116</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)56123913</subfield><subfield code="z">(OCoLC)60779275</subfield><subfield code="z">(OCoLC)62790351</subfield><subfield code="z">(OCoLC)85854521</subfield><subfield code="z">(OCoLC)162598622</subfield><subfield code="z">(OCoLC)174131682</subfield><subfield code="z">(OCoLC)181837890</subfield><subfield code="z">(OCoLC)481627711</subfield><subfield code="z">(OCoLC)507007971</subfield><subfield code="z">(OCoLC)559293131</subfield><subfield code="z">(OCoLC)606025859</subfield><subfield code="z">(OCoLC)646719739</subfield><subfield code="z">(OCoLC)722287456</subfield><subfield code="z">(OCoLC)728016755</subfield><subfield code="z">(OCoLC)765142482</subfield><subfield code="z">(OCoLC)856952338</subfield><subfield code="z">(OCoLC)933930901</subfield><subfield code="z">(OCoLC)961573609</subfield><subfield code="z">(OCoLC)962648633</subfield><subfield code="z">(OCoLC)988539426</subfield><subfield code="z">(OCoLC)1035655557</subfield><subfield code="z">(OCoLC)1037444135</subfield><subfield code="z">(OCoLC)1037715414</subfield><subfield code="z">(OCoLC)1038664716</subfield><subfield code="z">(OCoLC)1045521064</subfield><subfield code="z">(OCoLC)1076307322</subfield><subfield code="z">(OCoLC)1081269775</subfield><subfield code="z">(OCoLC)1105719542</subfield><subfield code="z">(OCoLC)1132923694</subfield><subfield code="z">(OCoLC)1153522892</subfield><subfield code="z">(OCoLC)1228592581</subfield><subfield code="z">(OCoLC)1340077215</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">C93 2004eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.32</subfield><subfield code="2">bcl</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cyber adversary characterization :</subfield><subfield code="b">auditing the hacker mind /</subfield><subfield code="c">Tom Parker [and 4 others].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">[2004]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2004</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxxi, 324 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"Your window into the cyber enemy's mind"--Cover</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Preliminaries; Acknowledgments; Author; Contents; Chapter 1 Introduction; Chapter 2 Theoretical Characterization Metrics; Chapter 3 Disclosure and the Cyber Food Chain; Chapter 4 Rating the Attack; Chapter 5 Asset Threat Characterization; Chapter 6 Bringing It All Together; Chapter 7 WarmTouch; Chapter 8 Managing the Insider Threat; Chapter 9 The Cyber Adversary in Groups; Chapter 10 Characterizing the Extremes; Chapter 11 Conclusions; Chapter 12 Return on Investment; Final Words; Glossary; Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemys mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy. * This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. * This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense. * . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1="1" ind2="7"><subfield code="a">Computerbeveiliging.</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="650" ind1="1" ind2="7"><subfield code="a">Computercriminaliteit.</subfield><subfield code="2">gtt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Parker, Tom,</subfield><subfield code="d">1982-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJcGqyTtjd7bTxbHb4xbh3</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2004092596</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Cyber adversary characterization (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGBqcWbVj77PTMtqbVGfYK</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Cyber adversary characterization.</subfield><subfield code="d">Rockland, MA : Syngress, ©2004</subfield><subfield code="z">1931836116</subfield><subfield code="w">(OCoLC)56064605</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781931836111</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=114551</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">123Library</subfield><subfield code="b">123L</subfield><subfield code="n">33979</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00003861</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL294071</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">114551</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">cyberadversarych0000unse</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2361878</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2713034</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm56123913 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:15:34Z |
institution | BVB |
isbn | 1932266631 9781932266634 0080476996 9780080476995 9781931836111 1931836116 |
language | English |
oclc_num | 56123913 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxxi, 324 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2004 |
publishDateSearch | 2004 |
publishDateSort | 2004 |
publisher | Syngress, |
record_format | marc |
spelling | Cyber adversary characterization : auditing the hacker mind / Tom Parker [and 4 others]. Rockland, MA : Syngress, [2004] ©2004 1 online resource (xxxi, 324 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file "Your window into the cyber enemy's mind"--Cover Includes index. Print version record. Preliminaries; Acknowledgments; Author; Contents; Chapter 1 Introduction; Chapter 2 Theoretical Characterization Metrics; Chapter 3 Disclosure and the Cyber Food Chain; Chapter 4 Rating the Attack; Chapter 5 Asset Threat Characterization; Chapter 6 Bringing It All Together; Chapter 7 WarmTouch; Chapter 8 Managing the Insider Threat; Chapter 9 The Cyber Adversary in Groups; Chapter 10 Characterizing the Extremes; Chapter 11 Conclusions; Chapter 12 Return on Investment; Final Words; Glossary; Index. The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemys mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy. * This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. * This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense. * . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Computerbeveiliging. gtt Computercriminaliteit. gtt Parker, Tom, 1982- https://id.oclc.org/worldcat/entity/E39PBJcGqyTtjd7bTxbHb4xbh3 http://id.loc.gov/authorities/names/no2004092596 has work: Cyber adversary characterization (Text) https://id.oclc.org/worldcat/entity/E39PCGBqcWbVj77PTMtqbVGfYK https://id.oclc.org/worldcat/ontology/hasWork Print version: Cyber adversary characterization. Rockland, MA : Syngress, ©2004 1931836116 (OCoLC)56064605 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781931836111 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=114551 Volltext |
spellingShingle | Cyber adversary characterization : auditing the hacker mind / Preliminaries; Acknowledgments; Author; Contents; Chapter 1 Introduction; Chapter 2 Theoretical Characterization Metrics; Chapter 3 Disclosure and the Cyber Food Chain; Chapter 4 Rating the Attack; Chapter 5 Asset Threat Characterization; Chapter 6 Bringing It All Together; Chapter 7 WarmTouch; Chapter 8 Managing the Insider Threat; Chapter 9 The Cyber Adversary in Groups; Chapter 10 Characterizing the Extremes; Chapter 11 Conclusions; Chapter 12 Return on Investment; Final Words; Glossary; Index. Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Computerbeveiliging. gtt Computercriminaliteit. gtt |
subject_GND | http://id.loc.gov/authorities/subjects/sh94001277 https://id.nlm.nih.gov/mesh/D016494 |
title | Cyber adversary characterization : auditing the hacker mind / |
title_auth | Cyber adversary characterization : auditing the hacker mind / |
title_exact_search | Cyber adversary characterization : auditing the hacker mind / |
title_full | Cyber adversary characterization : auditing the hacker mind / Tom Parker [and 4 others]. |
title_fullStr | Cyber adversary characterization : auditing the hacker mind / Tom Parker [and 4 others]. |
title_full_unstemmed | Cyber adversary characterization : auditing the hacker mind / Tom Parker [and 4 others]. |
title_short | Cyber adversary characterization : |
title_sort | cyber adversary characterization auditing the hacker mind |
title_sub | auditing the hacker mind / |
topic | Computer security. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security fast Computerbeveiliging. gtt Computercriminaliteit. gtt |
topic_facet | Computer security. Computer networks Security measures. Computer Security Sécurité informatique. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security Computerbeveiliging. Computercriminaliteit. |
url | https://www.sciencedirect.com/science/book/9781931836111 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=114551 |
work_keys_str_mv | AT parkertom cyberadversarycharacterizationauditingthehackermind |