skip to content
Cyber adversary characterization : auditing the hacker mind Preview this item
ClosePreview this item
Checking...

Cyber adversary characterization : auditing the hacker mind

Author: Tom Parker; et al
Publisher: Rockland, MA : Syngress, ©2004.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Print version:
Cyber adversary characterization.
Rockland, MA : Syngress, ©2004
(OCoLC)56064605
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Tom Parker; et al
ISBN: 1932266631 9781932266634 0080476996 9780080476995 9781931836111 1931836116
OCLC Number: 56123913
Notes: "Your window into the cyber enemy's mind"--Cover.
Includes index.
Description: 1 online resource (xxxi, 324 pages) : illustrations
Contents: Preliminaries; Acknowledgments; Author; Contents; Chapter 1 Introduction; Chapter 2 Theoretical Characterization Metrics; Chapter 3 Disclosure and the Cyber Food Chain; Chapter 4 Rating the Attack; Chapter 5 Asset Threat Characterization; Chapter 6 Bringing It All Together; Chapter 7 WarmTouch; Chapter 8 Managing the Insider Threat; Chapter 9 The Cyber Adversary in Groups; Chapter 10 Characterizing the Extremes; Chapter 11 Conclusions; Chapter 12 Return on Investment; Final Words; Glossary; Index.
Responsibility: Tom Parker ... [et al. ; foreword by Jeff Moss].

Abstract:

The growing connectivity among secure and insecure networks has created opportunities for unauthorized intrusions into sensitive or proprietary computer systems. This book demonstrates the motives  Read more...

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/56123913> # Cyber adversary characterization : auditing the hacker mind
    a schema:Book, schema:CreativeWork, schema:MediaObject ;
    library:oclcnum "56123913" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1039022947#Place/rockland_ma> ; # Rockland, MA
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/mau> ;
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/1039022947#Topic/computercriminaliteit> ; # Computercriminaliteit
    schema:about <http://experiment.worldcat.org/entity/work/data/1039022947#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://experiment.worldcat.org/entity/work/data/1039022947#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/1039022947#Topic/computerbeveiliging> ; # Computerbeveiliging
    schema:about <http://experiment.worldcat.org/entity/work/data/1039022947#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:bookFormat schema:EBook ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/1039022947#Person/parker_tom> ; # Tom Parker
    schema:copyrightYear "2004" ;
    schema:datePublished "2004" ;
    schema:description "The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemys mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy. * This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. * This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense. * . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face."@en ;
    schema:description "Preliminaries; Acknowledgments; Author; Contents; Chapter 1 Introduction; Chapter 2 Theoretical Characterization Metrics; Chapter 3 Disclosure and the Cyber Food Chain; Chapter 4 Rating the Attack; Chapter 5 Asset Threat Characterization; Chapter 6 Bringing It All Together; Chapter 7 WarmTouch; Chapter 8 Managing the Insider Threat; Chapter 9 The Cyber Adversary in Groups; Chapter 10 Characterizing the Extremes; Chapter 11 Conclusions; Chapter 12 Return on Investment; Final Words; Glossary; Index."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1039022947> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/56064605> ;
    schema:name "Cyber adversary characterization : auditing the hacker mind"@en ;
    schema:productID "56123913" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/56123913#PublicationEvent/rockland_ma_syngress_2004> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1039022947#Agent/syngress> ; # Syngress
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=114551> ;
    schema:url <http://www.books24x7.com/marc.asp?bookid=8026> ;
    schema:url <http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781931836111> ;
    schema:url <http://www.123library.org/book_details/?id=33979> ;
    schema:url <http://www.sciencedirect.com/science/book/9781931836111> ;
    schema:url <http://www.books24x7.com/marc.asp?isbn=1931836116> ;
    schema:url <http://site.ebrary.com/id/10062345> ;
    schema:url <http://proquest.safaribooksonline.com/?fpi=9780080476995> ;
    schema:url <http://www.myilibrary.com?id=105588> ;
    schema:workExample <http://worldcat.org/isbn/9781932266634> ;
    schema:workExample <http://worldcat.org/isbn/9780080476995> ;
    schema:workExample <http://worldcat.org/isbn/9781931836111> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/56123913> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/1039022947#Person/parker_tom> # Tom Parker
    a schema:Person ;
    schema:familyName "Parker" ;
    schema:givenName "Tom" ;
    schema:name "Tom Parker" ;
    .

<http://experiment.worldcat.org/entity/work/data/1039022947#Topic/computerbeveiliging> # Computerbeveiliging
    a schema:Intangible ;
    schema:name "Computerbeveiliging"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1039022947#Topic/computercriminaliteit> # Computercriminaliteit
    a schema:Intangible ;
    schema:name "Computercriminaliteit"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1039022947#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1039022947#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1039022947#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://worldcat.org/isbn/9780080476995>
    a schema:ProductModel ;
    schema:isbn "0080476996" ;
    schema:isbn "9780080476995" ;
    .

<http://worldcat.org/isbn/9781931836111>
    a schema:ProductModel ;
    schema:isbn "1931836116" ;
    schema:isbn "9781931836111" ;
    .

<http://worldcat.org/isbn/9781932266634>
    a schema:ProductModel ;
    schema:isbn "1932266631" ;
    schema:isbn "9781932266634" ;
    .

<http://www.engineeringvillage.com/controller/servlet/OpenURL?genre=book&isbn=9781931836111>
    rdfs:comment "Full text available from Referex Security and Networking" ;
    .

<http://www.worldcat.org/oclc/56064605>
    a schema:CreativeWork ;
    rdfs:label "Cyber adversary characterization." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/56123913> ; # Cyber adversary characterization : auditing the hacker mind
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.