Post Mon Jan 02, 2006 3:51 am

[Article]-Cyber Adversary Characterization: Auditing the Hacker Mind: Ch 1 - Mitnick Exposed

Book Review and Sample Chapter - "Cyber Adversary Characterization: Auditing the Hacker Mind" by Tom Parker, Eric Shaw, Ed Stroz, Matthew G. Devost and Marcus H. Sachs.

http://www.ethicalhacker.net/content/view/28/2/

Member Feedback.
CISSP, MCSE, CSTA, Security+ SME