Attack Types: Difference between revisions

From
Jump to navigation Jump to search
No edit summary
Line 1: Line 1:
[Right now, this topic is just a list of correlated topics. But that will change soon.]
[Right now, this topic is just a list of correlated topics. But that will change soon.]
*[[Systematization]]

*[[Spoofing]]
*[[Spoofing]]
*[[Man in the Middle]]
*[[Man in the Middle]]

Revision as of 13:43, 6 December 2004

[Right now, this topic is just a list of correlated topics. But that will change soon.]

Literature

  • Russell, Cunningham: Maximum Protection, MITP-Verlag Bonn, 2001, ISBN: 9783826606878
  • Eckert: IT-Sicherheit, Oldenbourg Verlag München Wien, 2003, ISBN: 3486272055
  • Cheswick, Bellovin, Rubin: Firewalls und Sicherheit im Internet, Addison-Wesley, 2004, ISBN: 9827321174

Links