tailieunhanh - Ebook Cyber crime investigators field guide: Part 2

In this part, the following content will be discussed: Appendix A: Glossary, Appendix B: Port numbers used by malicious trojan horse programs, Appendix C: Attack signatures, Appendix D: UNIX/Linux commands, Appendix E: Cisco PIX firewall commands, Appendix F: Discovering unauthorized access to your computer, Appendix G: . Department of justice search and seizure guidelines. |

TỪ KHÓA LIÊN QUAN