Всё для Учёбы — студенческий файлообменник
1 монета
doc

Студенческий документ № 018533 из НИУ ВШЭ (ГУ-ВШЭ)

1. Bug, glitch, flaw: similarities and differences

2. Debugging 3. Exploit. Zero-day exploit

4. Malware and PUPs

5. Adware, spyware

6. Types of downloads (pop-up, drive-by, barnacle)

7. Flash-based malware. Protection against flash-based malware

8. Virus structure

9. Classification of viruses (unit3)

10. Types of viruses (unit4)

11. Virus protection. Anti-viruses and firewalls

12. Bypass. Trapdoors and backdoors.

13. Phishing 14. Pharming

15. Spear phishing

16. Buffer overflow

17. Blended threat

18. Bluesnarfing

19. Cash poisoning

20. Caller ID spoofing

21. E-mail spoofing

22. Identity theft

23. Dumpster diving and shoulder surfing

24. Directory harvest attack and dictionary attack

25. Evil twin 26. Greynet

28. Hijacking. Browser hijacking.

29. IP spoofing

30. Smurfing 31. Snooping

32. Botnet. 33. Types of piracy

34. Moral and financial aspects of piracy

35. Types of spam

36. Spambot 37. Hackers and crackers

38. Black hat, white hat, grey hat, ethical hacker

39. Encryption 40. Authentication, authorization and accounting

41. Disaster recovery plan

42. Online backup

43. Chaffing and winnowing

44. Decipher 45. Desktop management

Показать полностью…
21 Кб, 11 декабря 2011 в 0:30 - Россия, Москва, НИУ ВШЭ (ГУ-ВШЭ), 2011 г., doc
Рекомендуемые документы в приложении