Showing posts with label cisco. Show all posts
Showing posts with label cisco. Show all posts

Cyber Adversary Characterization: Auditing the Hacker Mind Review

Cyber Adversary Characterization: Auditing the Hacker Mind
Average Reviews:

(More customer reviews)
Are you looking to buy Cyber Adversary Characterization: Auditing the Hacker Mind? Here is the right place to find the great deals. we can offer discounts of up to 90% on Cyber Adversary Characterization: Auditing the Hacker Mind. Check out the link below:

>> Click Here to See Compare Prices and Get the Best Offers

Cyber Adversary Characterization: Auditing the Hacker Mind ReviewAn uneven book. The preface and last chapter are by far the best parts. Noted technology commentator Richard Thieme ("Islands in the Clickstream") gives the preface. A mere 4 pages. But very eloquent and lucid. A joy to read. The last chapter is a semi-ficticious narrative of how a hacker breaks into various computers. Unix and network experts will like the depth and ingenuity described. It can be very educational, even for experienced sysadmins.
But other chapters are poorly done. For example, Chapter 2 is on Theoretical Characterisation Metrics. It repeatedly uses various conditional probabilities, but with a wrong notation. For a probability of B given A, it uses p(B)/A. The standard notation is P(B|A). Used for decades in statistics course. First year undergraduate level.
Other chapters, presumably written by different people, do use the correct notation. But Chapter 3, on the Cyber Food Chain, has an even more disturbing flaw. It has tables of what it calls mean inhibitor values. Derived from sets of values with only 1 significant figure. But the means are given to 4 significant figures! At best, the means only have 2. What this author is doing is imputing a false accuracy of 2 extra significant figures, or 100 times greater than actuality. More strictly, it is probably close to 1000 times greater, because the mean is really no better than one significant figure.
So what? Well, given that the authors goof on such elementary steps, it should give you serious reservations about their more "sophisticated" operations, where they discuss various metrics.
Another thing. One chapter's title is mis-spelled on the top of every page in the chapter. Irritating. Makes one wonder about the proof reading.Cyber Adversary Characterization: Auditing the Hacker Mind Overview

Want to learn more information about Cyber Adversary Characterization: Auditing the Hacker Mind?

>> Click Here to See All Customer Reviews & Ratings Now
Read More...