Who is Sam Spade?
Write a paper that includes responses to the following questions:
- What is Sam Spade? How is it used?
- What is the primary process by which Sam Spade functions in footprinting and network discovery?
- Use your research and reference to describe how Sam Spade is used by hackers and by security professionals.
Your paper should be 2-3 pages in length not including references.
Include at least two scholarly references in addition to the course textbook.