Of Viruses, Botnets, and Logic Bombs.
Learn about some of the most dangerous ways people can exploit the Internet's vulnerabilities, including DDoS attacks (which flood websites with connection requests), "Trojans" (malware hidden inside an innocent piece of information), and "botnets" (which control computers l...
Corporate Author: | |
---|---|
Format: | Video |
Language: | Undetermined |
Published: |
[San Francisco, California, USA] :
Kanopy Streaming,
2015.
|
Subjects: | |
Online Access: | Connect to this streaming video |
Internet
Connect to this streaming videoAvailable Online
Call Number | Status | Get It |
---|---|---|
Available |