Join thousands of book lovers
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.You can, at any time, unsubscribe from our newsletters.
The growing connectivity among secure and insecure networks has created opportunities for unauthorized intrusions into sensitive or proprietary computer systems. This book demonstrates the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.
Many businesses are taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. This book is suitable for system administrators and security professionals who need to bring IM and P2P applications under their control.
Sign up to our newsletter and receive discounts and inspiration for your next reading experience.
By signing up, you agree to our Privacy Policy.