Read access control, 213
Ready Business program, e129
Real evidence, 573
Real-time alert configuration, 1027
Realtime protection, e136–e137
Real-time transactions, and instant messaging (IM), 725
Rebuttal, 596
Receiver operating characteristic (ROC), 963–964
Rechberger, C., 863
bounce scans, 518
Idlescan, 516
decoy host, 516
FIN scan, 516
network mapping, 514–516
Nmap main page, 515–516
nonstandard ports, 517
port numbers, 517
port scanning, 516–517
fragmentation scanning, 517
ping, 517
TCP SYN Half Open, 517
vulnerability scanning, 518
well-known ports, 517
of VoIP, 873–874
call walking, 874
Reconnaissance techniques
pings, 81
port scanning, 82
traceroute, 81
vulnerability ...
Get Computer and Information Security Handbook, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.