TY - BOOK AU - Pollino,David TI - Hacker's challenge 3: 20 brand-new forensic scenarios & solutions SN - 0072263040 AV - QA76.9.A25 H322 2006 U1 - 005.8 22 PY - 2006/// CY - New York PB - McGraw-Hill KW - Computer networks KW - Security measures KW - Internet KW - Computer crimes KW - Computer hackers N1 - Includes index; pt. I. Challenges. To Catch a Phish -- Owning the Pharm -- Big Bait, Big Phish -- Shooting Phish in a Barrel -- Too Few Secrets -- Upgraded or "Owned?" -- Pale Blue Glow -- Crossing the Line -- The Root of the Problem -- Firewall Insights -- Peter LemonJello's "A Series of Unfortunate Events" -- Share and Share Alike -- The Holy Grail -- Open Source -- Cup of Chai -- Love Plus One -- Bullet in the Blue Sky -- The Insider III -- Jumping Someone Else's Train -- The Not-So-Usual Suspects -- pt. II. Solutions. To Catch a Phish -- Owning the Pharm -- Big Bait, Big Phish -- Shooting Phish in a Barrel -- Too Few Secrets -- Upgraded or "Owned?" -- Pale Blue Glow -- Crossing the Line -- The Root of the Problem -- Firewall Insights -- Peter LemonJello's "A Series of Unfortunate Events" -- Share and Share Alike -- The Holy Grail -- Open Source -- Cup of Chai -- Love Plus One -- Bullet in the Blue Sky -- The Insider III -- Jumping Someone Else's Train -- The Not-So-Usual Suspects UR - http://catdir.loc.gov/catdir/enhancements/fy0703/2006285214-b.html UR - http://catdir.loc.gov/catdir/enhancements/fy0703/2006285214-d.html UR - http://catdir.loc.gov/catdir/enhancements/fy0703/2006285214-t.html ER -