![]() McGraw-Hill, the McGraw-Hill Publishing logo, Hacking ExposedTM, and related trade dress are trademarks or registered trademarks of The McGraw-Hill Companies and/or its affiliates in the United States and other countries and may not be used without written permission. To contact a representative please e-mail us at. McGraw-Hill eBooks are available at special quantity discounts to use as premiums and sales promotions, or for use in corporate training programs. Where such designations appear in this book, they have been printed with initial caps. Rather than put a trademark symbol after every occurrence of a trademarked name, we use names in an editorial fashion only, and to the benefit of the trademark owner, with no intention of infringement of the trademark. All trademarks are trademarks of their respective owners. Except as permitted under the United States Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher. ![]() HACKING EXPOSED 7: NETWORK SECURITY SECRETS & SOLUTIONS ™ This page intentionally left blank HACKING EXPOSED 7: NETWORK SECURITY SECRETS & SOLUTIONS ™ ST UART M C CLU RE JOEL SCAMBRAY GEORGE K U RTZ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Copyright © 2012 by The McGraw-Hill Companies. C: Denial of Service (DoS) and Distributed Denial of Service (DDoS) Attacks. Examples of Popular APT Tools and Techniques. ![]() 6 Cybercrime and Advanced Persistent Threats. Determining Which Services are Running or Listening.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |