You are on page 1of 2

Cap 15.

Types of attacks and malicous software

You might also like