Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Often, several of these testing techniques are used together to gain more comprehensive assessment of the overall network security posture. For example, penetration testing usually includes network scanning and vulnerability scanning to identify vulnerable hosts and services that may be targeted for later penetration. Some vulnerability scanners incorporate password cracking. None of these tests by themselves will provide a complete picture of the network or its security posture. Table 3.1 at the end of this section summarizes the strengths and weaknesses of each test. After running any tests, certain procedures should be followed, including documenting the. | Solutions Manual CRYPTOGRAPHY AND network security Principles and Practice Fourth Edition William Stallings Copyright 2006 William Stallings -2- 2006 by William Stallings All rights reserved. No part of this document may be reproduced in any form or by any means or posted on the Internet without permission in writing from the author. .