For example, what appear to be probes and unsuccessful attacks may actually be the legitimate activity of network ... An attacker obtained 100, 000 credit card numbers from the records of a dozen retailers selling their products through Web anbsp;...
|Title||:||106-2 Hearings: Department of Defense Authorization for Appropriations for Fiscal Year 2001 and The Future Years Defense Program, S. Hrg. 106-609, Pt. 5, March 1, 6, 21, 24, April 4, 2000|
|Author||:||United States. Congress. Senate. Committee on Appropriations|