Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre numéro de téléphone mobile.

Prix Kindle : EUR 29,50

EUR 15,81 (35%)

TVA incluse

Ces promotions seront appliquées à cet article :

Certaines promotions sont cumulables avec d'autres offres promotionnelles, d'autres non. Pour en savoir plus, veuillez vous référer aux conditions générales de ces promotions.

Envoyer sur votre Kindle ou un autre appareil

Envoyer sur votre Kindle ou un autre appareil

Cyber Adversary Characterization: Auditing the Hacker Mind par [Parker, Tom, Sachs, Marcus, Shaw, Eric, Stroz, Ed]
Publicité sur l'appli Kindle

Cyber Adversary Characterization: Auditing the Hacker Mind Format Kindle

Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
EUR 29,50

Longueur : 512 pages Langue : Anglais

Descriptions du produit

Présentation de l'éditeur

The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy’s mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.

* This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.

* This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense.

* . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 4143 KB
  • Nombre de pages de l'édition imprimée : 512 pages
  • Editeur : Syngress; Édition : 1 (9 juillet 2004)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B0014EKPQU
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Composition améliorée: Non activé
  • Moyenne des commentaires client : Soyez la première personne à écrire un commentaire sur cet article
  • Classement des meilleures ventes d'Amazon: n°742.128 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Voulez-vous faire un commentaire sur des images ou nous signaler un prix inférieur ?

click to open popover

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur (beta) HASH(0x8f9dd578) étoiles sur 5 6 commentaires
9 internautes sur 10 ont trouvé ce commentaire utile 
HASH(0x8f5be174) étoiles sur 5 Uneven quality 27 août 2004
Par W Boudville - Publié sur
Format: Broché
An uneven book. The preface and last chapter are by far the best parts. Noted technology commentator Richard Thieme ("Islands in the Clickstream") gives the preface. A mere 4 pages. But very eloquent and lucid. A joy to read. The last chapter is a semi-ficticious narrative of how a hacker breaks into various computers. Unix and network experts will like the depth and ingenuity described. It can be very educational, even for experienced sysadmins.

But other chapters are poorly done. For example, Chapter 2 is on Theoretical Characterisation Metrics. It repeatedly uses various conditional probabilities, but with a wrong notation. For a probability of B given A, it uses p(B)/A. The standard notation is P(B|A). Used for decades in statistics course. First year undergraduate level.

Other chapters, presumably written by different people, do use the correct notation. But Chapter 3, on the Cyber Food Chain, has an even more disturbing flaw. It has tables of what it calls mean inhibitor values. Derived from sets of values with only 1 significant figure. But the means are given to 4 significant figures! At best, the means only have 2. What this author is doing is imputing a false accuracy of 2 extra significant figures, or 100 times greater than actuality. More strictly, it is probably close to 1000 times greater, because the mean is really no better than one significant figure.

So what? Well, given that the authors goof on such elementary steps, it should give you serious reservations about their more "sophisticated" operations, where they discuss various metrics.

Another thing. One chapter's title is mis-spelled on the top of every page in the chapter. Irritating. Makes one wonder about the proof reading.
7 internautes sur 8 ont trouvé ce commentaire utile 
HASH(0x8f5be1c8) étoiles sur 5 A methodical assessment of risk... 25 août 2004
Par Thomas Duff - Publié sur
Format: Broché
I finished reading Cyber Adversary Characterization - Auditing The Hacker Mind by Tom Parker, Eric Shaw, Ed Stroz, Matthew G. Devost, and Marcus H. Sachs. This is a very different book than anything I've seen, read, or reviewed...

Chapter breakout: Introduction; Theoretical Characterization Metrics; Disclosure and the Cyber Food Chain; Rating the Attack: Post-Incident Characterization Metrics; Asset Threat Characterization; Bringing It All Together: Completing the Cyber Adversary Model; WarmTouch: Assessing the Insider Threat and Relationship Management; Managing the Insider Threat; The Cyber Adversary in Groups: Targeting Nations' Critical Infrastructures; Characterizing the Extremes - Terrorists and Nation States; Return on Investment; Final Words; Glossary; Index

Most books that concern themselves with the "hacker mindset" do so with personality characterizations and attack methods. When you get done, you may understand how attacks occur, but you're no further along in doing a critical risk assessment of your particular environment. This book is the first I've seen that attempts to analyze the components mathematically in order to allow you to weight different scenarios against each other. The authors do a decent job in taking individual characteristics of the attacker, the environment, and the target, explaining how each component affects an attack scenario, and then giving a formula that can be used to assign a numeric value. While you may not agree with the interpretation, it's a rigorous approach to something that can be hard to quantify.

I haven't decided whether I approve of the WarmTouch chapter. It's a software package developed by the authors that attempts to chart threat assessment from a person based on email wording, actions, and other observed behavior. The idea is interesting, but I normally have issues with a book like this being used to push an author's product. I'll just say buyer beware in this case...

Bottom line... this would be a useful read for someone in security consulting and auditing, and would help an organization take a methodical view of their environment for risk assessment. There's not much on the book market like this volume.
4 internautes sur 5 ont trouvé ce commentaire utile 
HASH(0x8f5be600) étoiles sur 5 Poorly Written Book that Needs Serious Editing 27 août 2005
Par CyberChick - Publié sur
Format: Broché Achat vérifié
This book attempts to discuss a topic of great interest to me. Since there are no other books in print that address this topic, I eagerly bought the book with great expectations. Unfortunatly I have been highly disappointed.

I highly recommend you avoid this book if you have an aversion to the gross butchering of the English language. I have found this book to be so far over the line of good writing that it is distracting. I haven't even been able to make it out of the second chapter! Sentence structures are unnecessarily complex and wordy. The text is replete with grammatical errors and misspellings. The author created terms to describe his concepts, yet the terms have other connotations, making it further difficult to understand. Parsing and understanding what the author is trying to say in certain passages is difficult at best. I'm sure if I had been in meetings with this author, I would know his language and intuitively understand what he means, but the new reader, devoid of that knowledge, is at a significant disadvantage. If this book had been properly edited, it would be about half its size. One has to ask what the publisher was thinking, or not.

This is most unfortunate. The threat of cyber attacks against national interests and critical infrastructure is very high. Having a book that proposes a systematic methodology to help identify and address those threats would be most useful.
HASH(0x8f5be5e8) étoiles sur 5 Not clear, little useful information 5 avril 2014
Par a reader - Publié sur
Format: Format Kindle Achat vérifié
I concur with the 1-star rating by CyberChick for this book. I gave up on it at page 25--part way into Chapter 2. The prose goes on and on without a clear message nor conveying much useful information. Skimming ahead, it looks like later sections might be written by other authors and be better, but then again, they may not. I'm cutting my losses and giving up.
0 internautes sur 1 ont trouvé ce commentaire utile 
HASH(0x8f5be9b4) étoiles sur 5 Know thy self, know thy enemy 16 août 2005
Par Christopher Byrne - Publié sur
Format: Broché
Know thy enemy. This is only part of a famous quote by Sun Tzu. It is often quoted and is quite appropriate when discussing Cyber Adversary Characterization: Auditing The Hacker Mind (Tom Parker, Eric Shaw, et al, Syngress Press, 2004, 356 Pages, ISBN 1931836116). But to truly appreciate this book, which includes an account of Kevin Mitnick's first hand description of one of his attacks, you need to think about the entire quote from The Art of War: "Know thy self, know thy enemy. A thousand battles, a thousand victories."

The battle against hackers is not a single battle, but an on-going series of battles against an enemy that is often unseen and unknown. What the authors of this book attempt to do is offer a glimpse in the minds of hackers, what predisposes them to their behaviours, and an understanding of how this knowledge might be used to gain an advantage over this unseen enemy. To do so requires discussions of real events, psychology and modeling.

As such, this book is not for everyone, especially those who want an easy read. Psychological modeling is a difficult task to not only do, but to understand. The authors do their best in making this as easy as possible to understand, but I know I still had to re-read some sections multiple times. If you read this book, you will not walk away citing parts verbatim, but you will have a good desk reference to use when needed.

What is especially valuable in this book is the coverage of threats, both internal and external. The authors not only discuss this in terms and concepts, but offer methods to model and prioritize the threats. Have you ever thought about how myopic and narrow approaches can actually put you at greater risk?

Who Should Read This Book?

This is not a book for generalists. It really is for security specialists and students of security who want to get more than a superficial knowledge of the subject. Perhaps it might even be of interest to students of sociology and psychology. Tzu also said, "The opportunity to secure ourselves against defeat lies in our own hands, but the opportunity of defeating the enemy is provided by the enemy himself." That is the reason this book is one for the library of .serious students of the topic. If you do not fit any of these categories, you might want to steer clear. If you don't, know what you are getting into.


Par on an Par 4
Ces commentaires ont-ils été utiles ? Dites-le-nous