Attack Types: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 7: | Line 7: | ||
*[[Botnet|Botnets]] |
*[[Botnet|Botnets]] |
||
*[[Social Engineering]] |
*[[Social Engineering]] |
||
== Literature == |
|||
*Russell, Cunningham: ''Maximum Protection'', MITP-Verlag Bonn, 2001, ISBN: 9783826606878 |
|||
*Eckert: ''IT-Sicherheit'', Oldenbourg Verlag München Wien, 2003, ISBN: 3486272055 |
|||
*Cheswick, Bellovin, Rubin: ''Firewalls und Sicherheit im Internet'', Addison-Wesley, 2004, ISBN: 9827321174 |
Revision as of 19:10, 14 November 2004
[Right now, this topic is just a list of correlated topics. But that will change soon.]
- Spoofing
- Man in the Middle
- Denial of Service (DoS)
- Distributed Denial of Service (DDoS)
- Botnets
- Social Engineering
Literature
- Russell, Cunningham: Maximum Protection, MITP-Verlag Bonn, 2001, ISBN: 9783826606878
- Eckert: IT-Sicherheit, Oldenbourg Verlag München Wien, 2003, ISBN: 3486272055
- Cheswick, Bellovin, Rubin: Firewalls und Sicherheit im Internet, Addison-Wesley, 2004, ISBN: 9827321174