Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Tipologia atacurilor. Niveluri de atac
2.1 Atacuri locale
2.2 Atacuri la distanta
2.3 Niveluri de atac si niveluri de raspuns
Tehnici si instrumente de atac asupra
3.1 O posibila tipologie a programelor malitioase
3.2 Modalitati de actiune a programelor independente de tip vierme
3.3 Instrumente de atac de tip Cai Troieni, Back Doors-uri si bombe
Studii de caz
Studiu de caz 1 : Phishing-ul
4.1 Istoria phishingului
4.2 Email-uri
4.3 Atacuri bazate pe web
4.4 IRC si mesagerie instant
4.5 Vectorii de atac de tip phishing
- atacul "man-in-the-middle"
4.6 Atacul "Man-in-the-middle"
4.7 Reguli de siguranta impotriva phishingului
5.1 Programe malitioase
5.2 Virusi de fisier
5.3 Virusi de boot
0 of .
Results for:
No results containing your search query
P. 1
Atacul informatiei

Atacul informatiei

Ratings: (0)|Views: 716 |Likes:
Published by Cristina Enache

More info:

Published by: Cristina Enache on Mar 18, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 43 are not shown in this preview.

Activity (13)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
marcela_marcelaa liked this
natylea liked this
danutzu211 liked this
Cristina Rusu liked this
Anca Sarbu liked this
Sebastian Darie liked this
Grecu Adrian liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->