Attack Types: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
[Right now, this topic is just a list of correlated topics. But that will change soon.] |
[Right now, this topic is just a list of correlated topics. But that will change soon.] |
||
*[[Vulnerabilities|Preface]] |
*[[Vulnerabilities|Preface: Vulnerabilities]] |
||
*[[Spoofing]] |
*[[Spoofing]] |
||
*[[Man in the Middle]] |
*[[Man in the Middle]] |
Revision as of 13:30, 14 December 2004
[Right now, this topic is just a list of correlated topics. But that will change soon.]
- Preface: Vulnerabilities
- Spoofing
- Man in the Middle
- Denial of Service (DoS)
- Distributed Denial of Service (DDoS)
- Botnets
- Social Engineering
Literature
- Russell, Cunningham: Maximum Protection, MITP-Verlag Bonn, 2001, ISBN: 9783826606878
- Eckert: IT-Sicherheit, Oldenbourg Verlag München Wien, 2003, ISBN: 3486272055
- Cheswick, Bellovin, Rubin: Firewalls und Sicherheit im Internet, Addison-Wesley, 2004, ISBN: 9827321174