Linked e-resources
Details
Table of Contents
Chapter. 1. Counterintelligence Theory
Chapter. 2. The Cyber Operational Environment
Chapter. 3. Cyber Threats (and Opportunities)
Chapter. 4. Psychology and Criminal Profiling
Chapter. 5. Counterespionage
Chapter. 6. Technical Surveillance
Chapter. 7. Physical Surveillance
Chapter. 8. Data Analysis
Chapter. 9. Attack Attribution
Chapter. 10. Practical Deception
Chapter. 11. Legal Issues in Cyber Counterintelligence
Chapter. 12. Ethical Issues in Cyber Counterintelligence.
Chapter. 2. The Cyber Operational Environment
Chapter. 3. Cyber Threats (and Opportunities)
Chapter. 4. Psychology and Criminal Profiling
Chapter. 5. Counterespionage
Chapter. 6. Technical Surveillance
Chapter. 7. Physical Surveillance
Chapter. 8. Data Analysis
Chapter. 9. Attack Attribution
Chapter. 10. Practical Deception
Chapter. 11. Legal Issues in Cyber Counterintelligence
Chapter. 12. Ethical Issues in Cyber Counterintelligence.