Counter hack: a step-by-step guide to computer attacks and effective defenses
Counter hack: a step-by-step guide to computer attacks and effective defenses
Enhanced inquiry method for malicious object identification
ACM SIGSOFT Software Engineering Notes
An investigation of hotlinking and its countermeasures
Computer Communications
Hi-index | 0.00 |
Computer networks and computer systems are experiencing attacks and threats from many areas. Threats are also extended to include the individual user's computer assets and resources. Information will be presented on the categories of security and privacy threats, integrity threats, vulnerabilities, delay and denial threats, and intellectual property threats that are being directed towards corporate, educational, governmental, and individual assets.