Page 1454 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 1454

worms, logic bombs, and Trojan horses. We’ll then take a look at some
               of the other security exploits used by someone attempting to gain

               unauthorized access to a system or to prevent legitimate users from
               gaining such access.
   1449   1450   1451   1452   1453   1454   1455   1456   1457   1458   1459