Lex

Browse

GenresShelvesPremiumBlog

Company

AboutJobsPartnersSell on LexAffiliates

Resources

DocsInvite FriendsFAQ

Legal

Terms of ServicePrivacy Policygeneral@lex-books.com(215) 703-8277

© 2026 LexBooks, Inc. All rights reserved.

Cyber adversary characterization

Cyber adversary characterization

Tom Parker

Details

OL Work ID
OL19839227W

Subjects

NetworkingComputer networksCOMPUTERSGeneralComputer securityInternetSecuritySecurity measures

Find this book

Open Library
Book data from Open Library. Cover images courtesy of Open Library.