Cyber adversary characterization auditing the hacker mind /

I tiakina i:
Ngā taipitopito rārangi puna kōrero
Kaituhi rangatōpū: ebrary, Inc
Ētahi atu kaituhi: Parker, Tom
Hōputu: Tāhiko īPukapuka
Reo:Ingarihi
I whakaputaina: Rockland, MA : Syngress, c2004.
Ngā marau:
Urunga tuihono:An electronic book accessible through the World Wide Web; click to view
Ngā Tūtohu: Tāpirihia he Tūtohu
Kāore He Tūtohu, Me noho koe te mea tuatahi ki te tūtohu i tēnei pūkete!

MARC

LEADER 00000nam a2200000Ia 4500
001 0000074399
005 20171002053717.0
006 m u
007 cr cn|||||||||
008 040923s2004 mdua gs 001 0 eng d
020 |z 1931836116 
035 |a (CaPaEBR)ebr10062345 
035 |a (OCoLC)60779275 
040 |a CaPaEBR  |c CaPaEBR 
050 1 4 |a QA76.9.A25  |b C93 2004eb 
245 0 0 |a Cyber adversary characterization  |h [electronic resource] :  |b auditing the hacker mind /  |c Tom Parker ... [et al.] ; foreword by Jeff Moss. 
260 |a Rockland, MA :  |b Syngress,  |c c2004. 
300 |a xxi, 324 p. :  |b ill. 
500 |a Includes index. 
533 |a Electronic reproduction.  |b Palo Alto, Calif. :  |c ebrary,  |d 2009.  |n Available via World Wide Web.  |n Access may be limited to ebrary affiliated libraries. 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
655 7 |a Electronic books.  |2 local 
700 1 |a Parker, Tom. 
710 2 |a ebrary, Inc. 
856 4 0 |u http://site.ebrary.com/lib/daystar/Doc?id=10062345  |z An electronic book accessible through the World Wide Web; click to view 
908 |a 170314 
942 0 0 |c EB 
999 |c 63557  |d 63557