Home   FAQs   New Arrivals   Specials   Pricing & Shipping   Location   Corporate Services   Why Choose Bookware?  
Call our store: 9955 5567 (from within Sydney) or 1800 734 567 (from outside Sydney)
 View Cart   Check Out   
Browse by Subject
 TAFE Accounting
 TAFE I.T./Computing
 TAFE - Other
 Windows 8
 Adobe CS6
 CCNA 2012
 CCNP 2012
 Web Design
 Project Management
 Mobile Devices
 Windows Server 2012
 SQL Server 2012
Economics and Business
 Business Information Systems
 Human Resources

Cyber Adversary Characterization: Auditing the Hacker Mind

by: Tom Parker, Eric Shaw, Edward M. Stroz, Marcus H. Sachs, Matthew G. Devost

On-line Price: $54.95 (includes GST)

Paperback package 358

16%Off Retail Price

You save: $10.00

CLEARANCE Item - Special discount - limited stock!
N.Sydney : In Stock

Retail Price: $64.95

Publisher: SYNGRESS,01.07.04

Category: Security Level: B/I/A

ISBN: 1931836116
ISBN13: 9781931836111

Add to Shopping Cart

Full Description

Develop a Well-Measured Defense Against Cybercriminals

When we speak of the hacker mind, then, we have come to mean the mind of a miscreant motivated by a broad range of ulterior purposes. We mean script kiddies who download scripts written by others and execute them with the click of a button, we mean vandals with limited impulse control, we mean thieves of data, and then we mean all the people who use that data for extortion, corporate or industrial espionage, state-level spy craft, identity theft, grand larceny, blackmail, vicious revenge, or terror. That's lots of kinds of minds, needing to be understood, needing to be profiled, needing to be penetrated, needing to be known inside and out.--from the preface by Richard Thieme.

  Kevin Mitnick Exposed

The infamous hacker Kevin D. Mitnick allows himself and one of his more significant hacks to be weighed and measured.

      Cyber Terrorist: Just a Media Buzzword?

Learn how the second we become narrow-minded about the security of our organizations and the resolve of our cyber enemy is the second we become vulnerable to some of the worlds most dangerous minds.

      Understand Adversary Models

Can you answer the same questions your adversary will be asking, such as 'If I were to attack this target, what effort will be made to identify me, if my attack is detected?'

      Characterize Specific Threats

Identify where the real threats to your most critical assets lay and learn to answer the question of why you believe those threats are so real.

      Manage the Insider Threat

See how the key to early insider threat detection is in understanding how disgruntled employees move down the critical pathway towards an attack.

      Characterize the Extremes-Terrorists and Nation States

See why the authors believe that the concept of cyber terrorism should be viewed as a very real and critical emerging threat.

      Monitor a Cyber Stalker

Learn how software concepts such as 'WarmTouch' can help restore the psychological insights lost through traditional, technology driven insider detection techniques.

      Case Studies Offer Insight and Lessons

See how characterization theory can be used to analyze some of histories more memorable incidents with 20/20 vision.

      Your Solutions Membership Gives You Access to:

  Comprehensive FAQ page that consolidates all of the key points of this book into an easy to search web page

  'From the Author' Forum where the authors post timely

  The complete code listings from the book

  These downloadable e-booklets:

WarDriving: Drive, Detect, Defend: Learning to WarDrive

Stealing the Network: How to Own a Continent: Product of Fate: The Evolution of a Hacker

IT Ethics Handbook: Right and Wrong for IT Professionals: Ethics for Programmers and Analysts

Richard Thieme's Islands in the Clickstream: Reflections on Life in a Virtual World


Foreword by Jeff Moss

Chapter 1: Introduction

Chapter 2: Theoretical Characterization Metrics

Chapter 3: Disclosure and the Cyber Food Chain

Chapter 4: Rating the Attack: Post-Incident Characterization Metrics

Chapter 5: Asset Threat Characterization

Chapter 6: Bringing It All Together: Completing the Cyber Adversary Model

Chapter 7: WarmTouch: Assessing the Insider Threat and Relationship Management

Chapter 8: Managing the Insider Threat

Chapter 9: The Cyber Adversary in Groups: Targeting Nations' Critical Infrastructures

Chapter 10: Characterizing the Extremes-Terrorists and Nation States

Chapter 11: Conclusions

Chapter 12: Return on Investment