- Origin
- Threat Types
- Summary
- Exam Prep Questions
- Need to Know More?
Need to Know More?
The Internet Storm Center: http://isc.incidents.org.
Denial of Service Attacks: http://www.cert.org/tech_tips/denial_of_service.html.
Unauthorized P2P Use Risky for Businesses: http://www.idg.net/ic_1326812_9677_1-5044.html.
Allen, Julia H. The CERT Guide to System and Network Security Practices. Boston: Addison-Wesley, 2001.
Hines, Annlee A. Planning for Survivable Networks. Indianapolis, Indiana: Wiley Publishing, Inc. 2002.
McCarthy, Mary Pat and Stuart Campbell. Security Transformation: Digital Defense Strategies to Protect Your Company's Reputation & Market Share. New York: McGraw-Hill, 2001.
Mitnick, Kevin. The Art of Deception: Controlling the Human Element of Security. Indianapolis, Indiana: Wiley Publishing, Inc. 2002.
Power, Richard. Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace. Indianapolis, Indiana: Que, 2000.