Chapter 12. Cloud Computing and Botnets

This chapter covers the following topics:

Image Cloud Computing: Although not specifically designed to be hacking tools, sniffers can be used to find many types of clear-text network traffic.

Image Botnets: This general class of tools and techniques can be used for denial of service, fake pharmaceuticals, fake goods, illegal software, bootleg music, or even potentially extortion.

This chapter introduces you to cloud computing and botnets. Cloud computing is a new consumption and delivery model for IT services. The ...

Get Certified Ethical Hacker (CEH) Version 9 Cert Guide, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.