![](images/graphics/blank.gif)
The cyber adversary model
-
Ebook Cyber adversary characterization - Auditing the hacker mind part 2 includes contents: Chapter 6 bringing it all together: completing the cyber adversary model, chapter 7 warmtouch: assessing the insider threat and relationship management, chapter 8 managing the insider threat, chapter 9 the cyber adversary in groups: targeting nations' critical infrastructures, chapter 10 characterizing the extremes-terrorists and nation states, chapter 11 conclusions, chapter 12 return on investment.
190p
haojiubujain06
05-09-2023
5
2
Download
CHỦ ĐỀ BẠN MUỐN TÌM
![](images/graphics/blank.gif)