Show Summary Details

Quick Reference

The sequence of activities that a particular cracker carries out when attempting to make an illegal intrusion into a network. While such a sequence does not have the uniqueness of fingerprints it is clear that certain crackers can be identified by their sequence of attempts to enter a network.

Subjects: Computing.

Reference entries

Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.