Cyber Adversary Characterization: Auditing the Hacker Mind

Cyber Adversary Characterization The growing connectivity among secure and insecure networks has created opportunities for unauthorized intrusions into sensitive or proprietary computer systems. This book demonstrates the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels. Full description