The politics; laws of security; classes of attack; methodology; diffing; decrypting; brute force; unexpected input; buffer overrun; sniffing; session hijacking; spoofing; server holes; client holes;... This description may be from another edition of this product.