01101nam a2200277Ia 4500001001200000003000800012006001900020007001500039008004100054020001500095040002100110035002000131050002700151245014000178260003800318300002400356500002000380533015200400650002300552650004200575655002900617700001700646710001700663856012600680999001700806ebr10062345CaPaEBRm u cr cn|||||||||040923s2004 mdua gs 001 0 eng d z1931836116 aCaPaEBRcCaPaEBR a(OCoLC)6077927514aQA76.9.A25bC93 2004eb00aCyber adversary characterizationh[electronic resource] :bauditing the hacker mind /cTom Parker ... [et al.] ; foreword by Jeff Moss. aRockland, MA :bSyngress,cc2004. axxi, 324 p. :bill. aIncludes index. aElectronic reproduction.bPalo Alto, Calif. :cebrary,d2009.nAvailable via World Wide Web.nAccess may be limited to ebrary affiliated libraries. 0aComputer security. 0aComputer networksxSecurity measures. 7aElectronic books.2local1 aParker, Tom.2 aebrary, Inc.40uhttp://site.ebrary.com/lib/rucke/Doc?id=10062345zAn electronic book accessible through the World Wide Web; click to view c46800d46800