Monday, December 27, 2010

Dinosaurs Shooting Bubbles Game



Hola!

These slides also Computer Security Course the Intermediate Training Course for Microcomputer Systems and Networks , is the second part of a subject in which we are studying techniques and countermeasures to hacker attacks. Specifically, in this installment we talk about hacker techniques used by attackers attempting to compromise the security of a computer system, with special techniques hicapié in anonymity, spoofing, sniffing and hijacking.


This presentation is a derivative work of the training seminars conducted by Antonio Guzman and the Beltran Marta URJC Móstoles.



Greetings!

0 comments:

Post a Comment