Cerita Rakyat Indonesia - Kumpulan Cerita Cerita Rakyat Dari Indonesia

Saturday, December 26, 2009

HACK PROOFING YOUR INTERNET TRADECRAFT


HACK PROOFING YOUR INTERNET TRADECRAFT

Part I: Theory and Ideals
Chapter 1: Politics
Chapter 2 Laws of Security
Chapter 3: Classes of Attack
Chapter 4: Methodology

Part II: Theory and Ideals
Chapter 5: Diffing
Chapter 6: Cryptography
Chapter 7: Unexpected Input
Chapter 8: Buffer Overflow

Part III: Remote Attacks
Chapter 9: Sniffing
Chapter 10: Session Hijacking
Chapter 11: Spoofing: Attacks on Trusted Identity
Chapter: 12 Server Holes
Chapter 13: Client Holes
Chapter 14: Viruses, Trojan Horses, and Worms

Part IV: Reporting
Chapter 15 Reporting Security Problems




Stumble
Delicious
Technorati
Twitter
Facebook

0 Comments:

Post a Comment

Advertising

 

njajal Copyright © 2010 LKart Theme is Designed by Lasantha