References

Aharoni, Mati. “SNMP Enumeration and Hacking.” Security ProNews. http://www.securitypronews.com/securitypronews-24-20030909SNMPEnumerationandHacking.html (accessed January 29, 2010).

Andersen, Ross. Security Engineering: A Guide to Building Dependable Distributed Systems, 2nd edition. Hoboken, NJ: Wiley, 2008.

Asay, Matt.“The GPL: Understanding the License that Governs Linux.” Novell. http://www.novell.com/coolsolutions/feature/1532.html (accessed July 10, 2013).

Bacher, Paul, Thorsten Holz, Markus Kotter, and Georg Wicherski. “Know Your Enemy: Tracking Botnets.” The Honeynet Project. http://www.honeynet.org/papers/bots (aceessed November 22, 2009).

“Bank of America Employee Charged with Planting Malware on ATMs.” Privacy Digest ...

Get Hacker Techniques, Tools, and Incident Handling, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.