Advertisement

Computer Network Vulnerabilities

Chapter
  • 1.4k Downloads

Keywords

Security Policy System Administrator Security Problem Design Flaw Severe Acute Respiratory Syndrome 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

4.4 References

  1. 1.
    Pipkin, Donald. Information Security: Protecting the Global Enterprise. Upper Saddle River, N.J: Prentice Hall PTR, 2000.Google Scholar
  2. 2.
    Pethia, Richard D. “Information Technology—Essential But Vulnerable: How Prepared Are We for Attacks?” http://www.cert.org/congressional_testimony/Pethia_testimony_Sep26.htmlGoogle Scholar
  3. 3.
    Kizza, Joseph. M. Ethical and Social Issues in the Information Age. Second Edition. New York: Springer-Verlag, 2003.Google Scholar
  4. 4.
    Hurley, Jim and Eric Hemmendinger. “Open Source and Linux: 2002 Poster Children for Security Problems”. http://www.aberdeen.com/ab_abstracts/2002/11/11020005.htmGoogle Scholar
  5. 5.
    Palumbo, John. “Social Engineering: What is it, why is so little said about it and what can be done?”. SANS, http://www.sans.org/rr/social/social.phpGoogle Scholar
  6. 6.
    Granger, Sarah. “Social Engineering Fundamentals, Part I: Hacker Tactics” http://www.securityfocus.com/infocus/1527.Google Scholar

Copyright information

© Springer Science+Business Media, Inc. 2005

Personalised recommendations