Ebook Hacking a terror network: The silent threat of covert channels
Số trang: 400
Loại file: pdf
Dung lượng: 8.45 MB
Lượt xem: 15
Lượt tải: 0
Xem trước 10 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
In Hacking a terror network: The silent threat of covert channels, Russ Rogers uses a fictional scenario to demonstrate how terrorists may use the Internet to coordinate and launch a new series of terrorist attacks.While the scenario may be fictitious, the techniques and technologies that Russ uses are drawn straight from the computer security world, making this not only an interesting literary read but also a technical manual on how covert channels work and how law enforcement and intelligence organizations can go about discovering and defeating them.This book is packed with real-life examples of how tools work, including screenshots and narrative tutorials. Both amateurs and seasoned security professionals will benefit from reading this book.
Nội dung trích xuất từ tài liệu:
Ebook Hacking a terror network: The silent threat of covert channels
Nội dung trích xuất từ tài liệu:
Ebook Hacking a terror network: The silent threat of covert channels
Tìm kiếm theo từ khóa liên quan:
Network security Computer security Information security Hacking a terror network Unseen Planning Images of Death The Real Assignment Creating the CodeTài liệu liên quan:
-
61 trang 306 0 0
-
Ebook Managing risk and information security: Protect to enable - Part 2
102 trang 279 0 0 -
Ebook Simple computer security: Disinfect your PC – Part 1
131 trang 122 0 0 -
Ebook The Database hacker's handbook: Defending database servers – Part 1
280 trang 120 0 0 -
Ebook Simple computer security: Disinfect your PC – Part 2
226 trang 114 0 0 -
Ebook Protecting your library's digital sources: the essential guide to planning and preservation
121 trang 102 0 0 -
192 trang 62 0 0
-
Lecture Network security: Chapter 8 - Dr. Munam Ali Shah
31 trang 51 0 0 -
Lecture Business driven information systems (4/e): Chapter 4 - Paige Baltzan
46 trang 49 0 0 -
Ebook Information security fundamentals: Part 2
144 trang 48 0 0