CISC 879 - Machine Learning for Solving Systems Problems John Cavazos Dept of Computer & Information Sciences University of Delaware cavazos/cisc879.
PPT
Chapter 2: Attackers and Their Attacks Security+ Guide to Network Security Fundamentals Summer 2006.
Chapter 2: Attackers and Their Attacks. 2 OBJECTIVES Develop attacker profiles Describe basic attacks Describe identity attacks Identify denial of service.