Part II: Vulnerabilities and Exposures: How Things Don t Work, and Why

   
IN THIS PART
 

4 Theft and Destruction of Property: Data Attacks

 

5 Picking Locks: Password Attacks

 

6 Evil Automatons: Malware, Trojans, Viruses, and Worms

 

7 Eavesdropping and Snooping for Information: Sniffers and Scanners

 

8 Impersonation and Infiltration: Spoofing

 

9 Everything Else


   
Top


Mac OS X Maximum Security
Maximum Mac OS X Security
ISBN: 0672323818
EAN: 2147483647
Year: 2003
Pages: 158

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net