Don't Know Your ARP From Your Elbow?
A Glossary of Computer Security Threats
von J. R. Haythorne
Dies ist der Preis, den Ihre Kunden sehen. Listenpreis bearbeiten
Über das Buch
Sun Tzu said in "The Art of War":
"If you know the enemy and know yourself, you need not fear the results of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle"
The purpose of this book is to explain, in plain English, many of the terms routinely used by Hackers, Crackers (and even IT Security professionals) when talking about the varied threats, potential attacks and types of malign software faced by today's computer users. It does not describe how to carry out any attacks, nor does it tell you how to protect yourself against them, but it does try to provide a simple explanation of what these threats actually are, so that you at least understand what it is that you need to protect yourself against!
"If you know the enemy and know yourself, you need not fear the results of a hundred battles. If you know yourself but not the enemy, for every victory gained you will also suffer a defeat. If you know neither the enemy nor yourself, you will succumb in every battle"
The purpose of this book is to explain, in plain English, many of the terms routinely used by Hackers, Crackers (and even IT Security professionals) when talking about the varied threats, potential attacks and types of malign software faced by today's computer users. It does not describe how to carry out any attacks, nor does it tell you how to protect yourself against them, but it does try to provide a simple explanation of what these threats actually are, so that you at least understand what it is that you need to protect yourself against!
Eigenschaften und Details
- Hauptkategorie: Computer & Internet
-
Projektoption: Quadratisch klein, 18×18 cm
Seitenanzahl: 68 - Veröffentlichungsdatum: Aug. 11, 2008
- Schlüsselwörter Information Security, Computers, Hacking
Mehr anzeigen