Tải bản đầy đủ (.pdf) (2 trang)

Nghiên cứu một số phương pháp tấn công hệ thống thông tin

Bạn đang xem bản rút gọn của tài liệu. Xem và tải ngay bản đầy đủ của tài liệu tại đây (204.94 KB, 2 trang )

u mt s 
th


n


i hi hc Qui
Lu 
Ngi hng dn : PGS.TS. Trnh Nht Tin
o v: 2013
68 tr .

Abstract. 





 , , 
. 

 . 


, 



















 . 





 , 












 oogle









Keywords.  phn mm; H th; An ninh mng
Content.





















 .
, 





 

, 

, 












  . 
 . 






 




, 

, 













.



. 





















 . 
 , 













.


 



 , i
2.203 website cp ti Vit Nam b t y
 h thng mng. So v tn c
con s m. 









, 
, 


















 .

















 
. 





, 
 .  
acker, 



ra  






.




, 























 

 , , 


,  . 










 , 


.








4 
1:  



 . 


 ,  , 
, .
  






 , 
Hacker 











g tin.
3: 




















.








.

TÀI LIỆU THAM KHẢO
Tiếng Anh
1/. Google hacking: A tool for the Security Professional - SANS Institute 2000  2005
2/. Google Hacks - O'Reilly August 2006
3/. CEH v6 Module 01: Introduction to ethical hacking
4/. CEH v6 Module 04: Google Hacking
5/. wikipedia.org



×