February 2003
Beginner
336 pages
8h 40m
English
Table A.2 is a list of Web sites to use when looking for information on new and old vulnerabilities and countermeasures. Each site has its own unique spin on security, and each is focused differently. Referencing two or three of these sites daily can be extremely helpful in keeping up-to-date with current security issues.
| Description | Web Site Address |
|---|---|
| These sites are good for researching current threats and exploits, and recommended precautions and countermeasures. | http://www.cert.org/ http://www.infosecuritymag.com/ |
| This is a searchable online DB of vulnerabilities ... |
Read now
Unlock full access