Computer Network Vulnerabilities



Security Policy System Administrator Security Problem Design Flaw Severe Acute Respiratory Syndrome 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

4.4 References

  1. 1.
    Pipkin, Donald. Information Security: Protecting the Global Enterprise. Upper Saddle River, N.J: Prentice Hall PTR, 2000.Google Scholar
  2. 2.
    Pethia, Richard D. “Information Technology—Essential But Vulnerable: How Prepared Are We for Attacks?” Scholar
  3. 3.
    Kizza, Joseph. M. Ethical and Social Issues in the Information Age. Second Edition. New York: Springer-Verlag, 2003.Google Scholar
  4. 4.
    Hurley, Jim and Eric Hemmendinger. “Open Source and Linux: 2002 Poster Children for Security Problems”. Scholar
  5. 5.
    Palumbo, John. “Social Engineering: What is it, why is so little said about it and what can be done?”. SANS, Scholar
  6. 6.
    Granger, Sarah. “Social Engineering Fundamentals, Part I: Hacker Tactics” Scholar

Copyright information

© Springer Science+Business Media, Inc. 2005

Personalised recommendations