The ever-increasing emphasis and reliance on the use of computers and the Internet has come hand in hand with the increased threat of cyber-crime. Many systems and infrastructures are exceedingly vulnerable to attacks, as the complexity of computer networks is growing faster than the ability to understand and protect them. Heightened vigilance is not enough, but needs to be coupled with active defensive measures to guarantee the best protection. "Cyber Adversary Characterization" (Syngress) provides the reader with understanding of and an ability to anticipate that "cyber adversary" silently waiting in the wings to attack.
The book covers: -Cyber Terrorist: Just a Media Buzzword? -Kevin Mitnick Exposed -Understand Adversary Models -Characterize Specific Threats -Manage the Insider Threat -Characterize the Extremes-Terrorists and Nation States -Monitor a Cyber Stalker -Case Studies Offer Insight and Lessons "Cyber Adversary Characterization" is your window into the cyber enemy's mind. To order your copy or for more information, see: http://www.oreilly.com/catalog/1931836116/ or call 1-800-998-9938 or email [EMAIL PROTECTED] Cyber Adversary Characterization: Auditing the Hacker Mind Publisher: Syngress ISBN: 1931836116, 358 pages, $49.95 US, $69.95 CA http://www.oreilly.com/catalog/1931836116/ ----------------------------------------------------------------- If you want to cancel a subscription to this newsletter, or add subscriptions to other topics, go to http://www.oreillynet.com/cs/user/home For non-automated human help email [EMAIL PROTECTED] -----------------------------------------------------------------
