Describes underlying principles of hacker attacks and offers advice on securing networked systems, security checklists for common scenarios, theoretical background information, and real world examples of actual attacks.If the problem is allowed to get out of hand it could result in a potentially costly Denial-of-Service scenario. ... a few: Mail Abuse Prevention System (MAPS) http:/ /maps.vix.com/ Open Relay Behaviour-modification System (ORBS) http://www. orbs.org/ The point is that while email bombings are easy to ... CERT Advisory, a#39; CA-96.21 TCP SYN Flooding and IP Spoofing Attacksa#39;, September 1996, www. cert.org.
|Title||:||Inside Internet Security|
|Publisher||:||Pearson Education - 2000|