About the Book
Please note that the content of this book primarily consists of articles available from Wikipedia or other free sources online. Pages: 103. Chapters: Warchalking, Buffer overflow, Computer insecurity, Exploit, Timeline of computer viruses and worms, Threat, Vulnerability, Cross-site scripting, Windows Metafile vulnerability, Code injection, Port scanner, Stack buffer overflow, Shellcode, Buffer overflow protection, Wardriving, Race condition, Attack, Virus hoax, Privilege escalation, Covert channel, Metasploit Project, Zero-day attack, Password cracking, Dangling pointer, Data breach, IP hijacking, DNS cache poisoning, Time-of-check-to-time-of-use, Session hijacking, Pharming, Uncontrolled format string, Threat model, Shatter attack, Directory traversal, Dynamic linker, Defensive computing, TCP reset attack, Laptop theft, Off-by-one error, Integer overflow, SMS spoofing, Vishing, Heap spraying, Null character, War dialing, Intrusion detection system evasion techniques, Physical information security, XSS worm, Common Vulnerabilities and Exposures, Remote file inclusion, Operation: Bot Roast, SMBRelay, Swatting, Call gate, OSVDB, Arbitrary code execution, Cross-application scripting, Replay attack, Alphanumeric code, CPLINK, Heap overflow, Webattacker, Return-to-libc attack, The Open Organization Of Lockpickers, Shoulder surfing, Predictable serial number attack, Racetrack problem, Drive-by download, Reflection attack, Inter-protocol exploitation, Copy attack, Raw socket, Symlink race, XSA, Clear Channel Assessment attack, Warzapping, Memory safety, Login spoofing, NOP slide, Return-oriented programming, In-session phishing, Payload, Relay attack, JIT spraying, Vulnerability database, FTP bounce attack, Twinge attack, Lorcon, Heap feng shui, Improper input validation, STRIDE, Source code virus, GetAdmin, Blended threat, Mixed threat attack. Excerpt: A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly...