Narrow your search
Listing 1 - 2 of 2
Sort by

Book
Seven deadliest network attacks
Authors: --- ---
ISBN: 1282738259 9786612738258 1597495506 1597495492 9781597495509 9781282738256 9781597495493 Year: 2010 Publisher: Amsterdam ; Boston : Elsevier : Burlington, MA : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of ServiceWar DialingPenetration ""Test


Digital
Seven deadliest network attacks
Authors: --- ---
ISBN: 9781597495509 1597495506 1282738259 9781282738256 Year: 2010 Publisher: Boston Syngress

Loading...
Export citation

Choose an application

Bookmark

Abstract

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service War Dialing Penetration "Testing" Protocol Tunneling Spanning Tree Attacks Man-in-the-Middle Password Replay Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

Keywords

Listing 1 - 2 of 2
Sort by