Académique Documents
Professionnel Documents
Culture Documents
Lecture 1
Chp. 2 - Thomas
3 Computer hackers and hacking
J. Holt, etl.
Chp. 4 - Chuck
4 Denial of service attacks
Eastton
Chp. 3 - Thomas
5 Malware and automated computer attacks
J. Holt, etl.
Chp. 6 - Chuck
6 Techniques used by hackers
Eastton
Chp. 9 - Chuck
7 Security technology
Eastton
Chp. 11 - Chuck
8 Network scanning and vulnerability scanning
Eastton
Chp. 13 - Chuck
9 Cyber detective
Eastton
Chp. 10 -
10 Digital forensics Thomas J. Holt,
etl.
11 Revision