More Security

Special Guest Lecturer: Danny Quist


How They Break In

Handling A Break-in

So, you've been hacked. It happens. What do you do now?

Preventing Break-ins

There are just about as many methods and processes to preventing break-ins as there are methods to break into a computer system.

References

Title:The Cukoo's Egg Tracking a Spy Through the Maze of Computer Espionage
Author: Clifford Stoll
Publisher: Mass Market Paperback
ISBN: 0-6717-2688-9

Title:Practical UNIX & Internet Security, 2nd Edition
Author:Simson Garfinkel & Gene Spafford
Publisher:oreilly
ISBM:1-56592-148-8


Today's Date:
Last Modified:
K. Scott Rowe