Hacker's challenge 3 : 20 brand-new forensic scenarios & solutions / Hacker's challenge three David Pollino ... [et al.]. - New York : McGraw-Hill, c2006. - xxviii, 369 p. : ill. ; 24 cm.

Includes index.

pt. I. Challenges. To Catch a Phish -- Owning the Pharm -- Big Bait, Big Phish -- Shooting Phish in a Barrel -- Too Few Secrets -- Upgraded or "Owned?" -- Pale Blue Glow -- Crossing the Line -- The Root of the Problem -- Firewall Insights -- Peter LemonJello's "A Series of Unfortunate Events" -- Share and Share Alike -- The Holy Grail -- Open Source -- Cup of Chai -- Love Plus One -- Bullet in the Blue Sky -- The Insider III -- Jumping Someone Else's Train -- The Not-So-Usual Suspects -- pt. II. Solutions. To Catch a Phish -- Owning the Pharm -- Big Bait, Big Phish -- Shooting Phish in a Barrel -- Too Few Secrets -- Upgraded or "Owned?" -- Pale Blue Glow -- Crossing the Line -- The Root of the Problem -- Firewall Insights -- Peter LemonJello's "A Series of Unfortunate Events" -- Share and Share Alike -- The Holy Grail -- Open Source -- Cup of Chai -- Love Plus One -- Bullet in the Blue Sky -- The Insider III -- Jumping Someone Else's Train -- The Not-So-Usual Suspects.

0072263040 9780072263046

2006285214


Computer networks--Security measures.
Internet--Security measures.
Computer crimes.
Computer hackers.

QA76.9.A25 / H322 2006

005.8