Skip Abstract Section
Abstract
From the Publisher:
Maximum Security, Third Edition provides comprehensive, platform-by-platform coverage of security issues and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. In one book, security managers and others interested in computer and network security can learn everything the hackers already know, and then take steps to protect their systems.
Cited By
- Kolter J and Maloof M Learning to detect malicious executables in the wild Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, (470-478)
- Berghel H (2003). The discipline of Internet forensics, Communications of the ACM, 46:8, (15-20), Online publication date: 1-Aug-2003.
- de Vivo M, Carrasco E, Isern G and de Vivo G (1999). A review of port scanning techniques, ACM SIGCOMM Computer Communication Review, 29:2, (41-48), Online publication date: 1-Apr-1999.