The focus of this paper is to identify dominant trends of information security threats to the Internet 2001 to 2007. This paper is intended to provide an understanding of the new emphasis of attacks through use of robotic networks and how some users and organizations are already preparing a response
โฆ LIBER โฆ
[ACM Press the 4th annual conference - Kennesaw, Georgia (2007.09.28-2007.09.28)] Proceedings of the 4th annual conference on Information security curriculum development - InfoSecCD '07 - Puppetnets and botnets
โ Scribed by Carrow, Erwin Louis
- Book ID
- 121220439
- Publisher
- ACM Press
- Year
- 2007
- Weight
- 351 KB
- Category
- Article
- ISBN
- 1595939091
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
[ACM Press the 4th annual conference - K
โ
Carrow, Erwin Louis
๐
Article
๐
2007
๐
ACM Press
โ 351 KB
[ACM Press the 4th annual conference - K
โ
Fabian, Michael
๐
Article
๐
2007
๐
ACM Press
โ 76 KB
[ACM Press the 4th annual conference - K
โ
Bowman, Michael; Brown, Heath D.; Pitt, Paul
๐
Article
๐
2007
๐
ACM Press
โ 89 KB
[ACM Press the 4th annual conference - K
โ
Bowman, Michael; Brown, Heath D.; Pitt, Paul
๐
Article
๐
2007
๐
ACM Press
โ 89 KB
A rootkit is a small, hard to detect computer program that stealthily invades an operating system or kernel and takes control of the computer. The rootkit can be placed on a computer by a hacker that gains unauthorized access to a computer, or by an unsuspecting authorized user that allows a virus o
[ACM Press the 3rd annual conference - K
โ
Pashel, Brian A.
๐
Article
๐
2006
๐
ACM Press
โ 45 KB
[ACM Press the 1st annual conference - K
โ
Whitman, Michael E.; Mattord, Herbert J.
๐
Article
๐
2004
๐
ACM Press
๐
English
โ 85 KB