Network attacks and exploitation a framework
Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage
Saved in:
| Main Author: | |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Indianapolis, IN
John Wiley & Sons, Inc.
2015
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Table of Contents:
- Computer network exploitation
- The attacker
- The defender
- Asymmetries
- Attacker frictions
- Defender frictions
- Offensive strategy
- Defensive strategy
- Offensive case studies


