Hacking = Privacy: How Computer Hacking Can Shore Up Your Defenses and Deliver the Closest Ideal to Security Available.
Stuart McClurePublished in: TOOLS (39) (2001)
Keyphrases
- security threats
- security issues
- security concerns
- denial of service attacks
- security mechanisms
- penetration testing
- security risks
- information security
- security measures
- sensitive data
- security vulnerabilities
- security properties
- key management
- network security
- security problems
- security analysis
- statistical databases
- security requirements
- personal data
- security and privacy issues
- cyber security
- access control
- computer systems
- rfid systems
- dos attacks
- security services
- intrusion detection
- identity management
- data security
- resource constrained
- rfid tags
- individual privacy
- third party