[33] Ferguson,P.,andD.Senie.1998.Network ingress filtering: Defeating denial of service attacks which employ IP source address spoofing. RFC 2267. [34] McCanne, S., and V. Jacobson. 1993. The BSD packet filter: A new architecture for ...
Helping the average user of computers, or more broadly information technology, make sound security decisions, Computer Security Literacy: Staying Safe in a Digital World focuses on practica
Written for nontechnical readers, the book provides context to routine computing tasks so that readers better understand the function and impact of security in everyday life.
The last section recommends several network-based security solutions that can be successfully deployed. This book uses a define-attack-defend methodology for network security.
Seven Deadliest USB Attacks. Waltham, MA: Syngress. Andress, J., and Winterfeld, S. 2011. Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners. New York: Elsevier. Baldor, L. 2010. Military relaxes ban on computer ...