\

Understand the cyber attacker mindset : (Record no. 30326)

MARC details
000 -LEADER
fixed length control field 02558nam a2200289 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20251231123825.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 251231b2025 uk a|||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781398614284
040 ## - CATALOGING SOURCE
Original cataloging agency AUE
Transcribing agency AUE
Description conventions rda
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number HV6773.15
Item number .C97 A76 2024
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Armstrong-Smith, Sarah.
245 10 - TITLE STATEMENT
Title Understand the cyber attacker mindset :
Remainder of title build a strategic security programme to counteract threats /
Statement of responsibility, etc. Sarah Armstrong-Smith.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 ## - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture London, United Kingdom:
Name of producer, publisher, distributor, manufacturer Kogan Page,
Date of production, publication, distribution, manufacture, or copyright notice 2024.
300 ## - PHYSICAL DESCRIPTION
Extent 274 pages:
Other physical details illustrations;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
Content type code txt
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
Media type code n
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
Carrier type code nc
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc. To counteract a cyber attacker, organizations need to learn to think like one. Understand the Cyber Attacker Mindset explores the psychology of cyber warfare and how organizations can defend themselves against attacks. This book provides a comprehensive look at the inner workings of cyber attackers in the digital age and presents a set of strategies that organizations can deploy to counteract them. With technological advancements in cybersecurity, attackers are increasingly falling back to social engineering and preying on people's vulnerabilities. This book examines different types of cyber attackers, explores their motivations and examines the methods used. It also reviews key industry developments such as cybercrime as a service, brokers and syndicates, nation-sponsored actors, insider sabotage and the challenges faced by law enforcement in tracking and apprehending attackers. Understand the Cyber Attacker Mindset offers expert, strategic guidance on how organizations can improve their cybersecurity operations in response, including enhancing security awareness training, educating employees to identify and resist manipulation, understanding the importance of cultural variances and how board-level decision-making can directly influence attacks. Written by a renowned cybersecurity leader, the book draws on interviews with ex-criminals and top experts in the field to share rich insights and a wide range of case studies profiling notable groups, such as Anonymous, Lapsus$, FIN7, Nigeria's Yahoo Boys, Sandworm and the Lazarus Group. The human side of cybersecurity has never been so important
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cyberterrorism
General subdivision Prevention
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hackers
General subdivision Psychology
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Library of Congress Classification
Suppress in OPAC No
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection Home library Current library Date acquired Total checkouts Full call number Date last seen Copy number Price effective from Koha item type
    Library of Congress Classification     College of Computer Information Technology (CET) MAIN MAIN 12/31/2025   HV6773.15 .C97 A76 2024 12/31/2025 1 12/31/2025 Books