Back to Results
First PageMeta Content
Computer security / Firewall / IP address spoofing / Denial-of-service attack / Internet security / Network address translation / IP address / Transmission Control Protocol / Port / Computer network security / Cyberwarfare / Computing


Chapter 18: Network Attack and Defense C H A P TE R 18 Network Attack and Defense
Add to Reading List

Document Date: 2006-10-12 06:34:00


Open Document

File Size: 732,88 KB

Share Result on Facebook

Company

Amazon / Building Dependable Distributed Systems / Panix / NEEDHAM / Yahoo / Microsoft / /

Country

United States / United Kingdom / /

IndustryTerm

the Web / Internet Control Message Protocol / back-end business systems / email / Internet worm / network-connected devices / local networking / configuration management / Internet Protocols / intrusion detection systems / uses available tools / online subscriber / Internet services / Internet relay chat / exploit software / file server / file systems / Internet host addresses / higher-level services / Internet connection / high-profile Web sites / target network / target site / Web servers / packet sniffer software / network services / short-term solution / stateless protocol / Internet protocol suite / few military systems / Internet security / virtual private network / fixed and new software releases / Internet Protocol / boundary control devices / Web server software / attack software / sold solution / Internet Information Server / penetration tools / vulnerable Web servers / secure network / software monoculture / internal network / /

OperatingSystem

Unix / Linux / Macintosh / Windows NT / Windows 95 / Solaris operating system / /

Organization

FDA / /

Person

Bob / Alice / /

/

Position

U.K. prime minister / and were initially blamed on hackers / system administrator / private detective / working security engineer / administrator / AND BUTLER / /

Product

Information Server / /

Technology

SNMP / LAN / IPv6 / SNMP protocol / subnet mask / POP protocols / Unix / Linux / IP / VPN / disk drive / stateless protocol / Internet protocols / plug and play / operating system / operating systems / Network File System / TCP/IP / CGI / encryption / Ethernet / cryptography / DNS / firewall / lower-level TCP/IP protocols / network address translation / 2.2 Attacks Using Internet Protocols / file sharing / HTTP / ISP / Web server / network protocols / be solved using cryptography / /

URL

www.rootshell.com / www.netscan.org / /

SocialTag