|
by Ayala, Luis
Published 2016
“... of damage possible, and how to respond when a cyber-physical attack occurs. Detailed descriptions of cyber...”Published 2016
Apress, Distributed to the Book trade worldwide by Springer Science+Business Media New York
|
Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response
“... is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged...”- 1
- 2