Explains how and why hackers break into computers, steal information, and deny services to machines' legitimate users, and discusses strategies and tools used by hackers and how to defend against them.Another requirement to protect against these types of attacks is to make sure the company does not punish users for following the procedures. For example, the ... This chapter covered various forms of spoofing, including IP spoofing, email spoofing, web spoofing, and non-technical spoofing attacks. ... Only by understanding how they work can you be in a better position to prevent these types of attacks.
|Publisher||:||Sams Publishing - 2002|