O'Reilly logo

Seven Deadliest Network Attacks by Mike Borkin, Rob Kraus, Stacy Prowell

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Introduction

INFORMATION IN THIS CHAPTER

image Book Overview and Key Learning Points

image How This Book Is Organized

BOOK OVERVIEW AND KEY LEARNING POINTS

Security is heavily contextual; the effectiveness of any security measures depends on the context into which they are deployed. What if you give keys to the janitor, and he or she leaves them in his or her unlocked car? Further security is often not incremental; insecurity in one area can lead to insecurity in all areas. Hackers might break into your machines and steal your proposals and bidding information, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required