References

Mati. Aharoni, "SNMP Enumeration and Hacking." Security ProNews. http://www.securitypronews.com/securitypronews-24-20030909SNMPEnumerationandHacking.html (accessed January 29, 2010).

Ross. Andersen, Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd edition. Hoboken, NJ: Wiley, 2008.

Paul, Bacher, and Wicherski. Georg "Know Your Enemy: Tracking Botnets." The Honeynet Project. http://www.honeynet.org/papers/bots (aceessed November 22, 2009).

"Bank of America Employee Charged with Planting Malware on ATMs." Privacy Digest. http://www.privacydigest.com/2010/04/09/bank%20america%20employee%20charged %20planting%20malware%20atms (accessed April 9, 2010).

Justin. Blum, "Hackers Target U.S. Power Grid." Washington Post. ...

Get Hacker Techniques, Tools, and Incident Handling now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.