This slide presentation outlines information on detemining wheather your water system's computer security systems are vulnerable to attack. Topics covered include: learn to think like hackers(crackers);learn the methodologyhackers use to penetrate your systems;learn to use the tools thathackers use;practice using tools on a testor lab network; hacker resources; and, countermeasures.
Product Details
Edition: Vol. - No. Published: 04/01/2005 Number of Pages: 15 File Size: 1 file , 1.2 MB