Lecture Professional Practices in IT: Lecture 20
Số trang: 15
Loại file: pdf
Dung lượng: 269.37 KB
Lượt xem: 18
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
After studying this chapter you will be able to understand: Modes of hacker attack, spoofing, IP spoofing – flying-blind attack, IP spoofing – source routing, email spoofing, web spoofing, web spoofing – tracking state, session hijacking, session hijacking, denial of service (DOS) attack,...
Nội dung trích xuất từ tài liệu:
Lecture Professional Practices in IT: Lecture 20
Nội dung trích xuất từ tài liệu:
Lecture Professional Practices in IT: Lecture 20
Tìm kiếm theo từ khóa liên quan:
Professional Practices in IT Computer Science IT profession Information Technology Professional Ethics Crackers existTài liệu liên quan:
-
11 trang 141 0 0
-
Ebook Facts on file science experiments: Computer science experiments – Part 1
92 trang 69 0 0 -
9 trang 60 0 0
-
Lecture Computer Architecture: Introduction
9 trang 45 0 0 -
Ebook Career paths: Information technology
16 trang 43 0 0 -
Lecture Note Professional practices in information technology - Lecture No. 31: RiskManagement
5 trang 42 0 0 -
139 trang 42 0 0
-
Ebook Financial management of the veterinary practice: Part 2
113 trang 40 0 0 -
231 trang 40 0 0
-
Lecture Professional Practices in IT: Lecture 27
14 trang 40 0 0