1
by Easttom, Chuck
Published 2011
Pearson
Table of Contents: ... -- Denial of service attacks -- Malware -- Techniques used by hackers -- Industrial espionage in cyberspace...