Return to Article Details The taxonomies of the attacks on computer systems Download Download PDF