×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
fred-cohen documents
Documents
A04249_F_ch36PPT
Documents
A cryptographic checksum for integrity protection
Documents
A secure computer network design
Documents
Computational aspects of computer viruses
Documents
Maintaining a poor person's information integrity
Documents
On the implications of computer viruses and methods of defense
Documents
Internet holes — Part 3: The sendmail maelstrom
Documents
Internet holes — Part 5a: 50 ways to attack your web systems
Documents
Internet holes — Part 12a: Internet incident response
Documents
Internet holes — Part 9: IP address forgery and how to eliminate it
Documents
Internet holes — Part 13: The SYN flood
Documents
Internet holes — Part 8: Spam
Documents
Internet holes — Part 10: UDP viruses
Documents
Internet holes — Part 2: Packet fragmentation attacks
Documents
A method for forensic analysis of control
Documents
Information system attacks: A preliminary classification scheme
Documents
A Mathematical Structure of Simple Defensive Network Deceptions
Documents
Information system defences: A preliminary classification scheme
Documents
A cause and effect model of attacks on information systems: Some Analysis Based on That Model, and The Application of that Model for CyberWarfare in CID
Documents
Intrusion detection and response
Documents
A note on the role of deception in information protection
Next >