By carrying out ‘white hat’ attacks to identify potential entry points in the externally facing parts of an organization’s IT network, such as its firewalls, email-servers or web-servers, pen testing ...
from Help Net Security http://ift.tt/1J0YqBy
from Help Net Security http://ift.tt/1J0YqBy
0 comments:
Post a Comment