The ever-increasing emphasis and reliance on the use of computers and the
Internet has come hand in hand with the increased threat of cyber-crime.
Many systems and infrastructures are exceedingly vulnerable to attacks, as
the complexity of computer networks is growing faster than the ability to
understand and protect them. Heightened vigilance is not enough, but needs
to be coupled with active defensive measures to guarantee the best
protection. "Cyber Adversary Characterization" (Syngress) provides the
reader with understanding of and an ability to anticipate that "cyber
adversary" silently waiting in the wings to attack.

The book covers:

-Cyber Terrorist: Just a Media Buzzword?
-Kevin Mitnick Exposed
-Understand Adversary Models
-Characterize Specific Threats
-Manage the Insider Threat
-Characterize the Extremes-Terrorists and Nation States
-Monitor a Cyber Stalker
-Case Studies Offer Insight and Lessons

"Cyber Adversary Characterization" is your window into the cyber enemy's
mind.


To order your copy or for more information, see:
http://www.oreilly.com/catalog/1931836116/
or call 1-800-998-9938
or email [EMAIL PROTECTED]


Cyber Adversary Characterization: Auditing the Hacker Mind
Publisher: Syngress
ISBN: 1931836116, 358 pages, $49.95 US, $69.95 CA
http://www.oreilly.com/catalog/1931836116/

-----------------------------------------------------------------
If you want to cancel a subscription to this newsletter,
or add subscriptions to other topics, go to
http://www.oreillynet.com/cs/user/home 

For non-automated human help email [EMAIL PROTECTED]
-----------------------------------------------------------------

Reply via email to