S
Safety considerations, pen-test lab
basic considerations
381CD labeling
378–379data transfer
378destruction and sanitization
379–380documentation
380–381install disk security
377–378network configuration
376–377network isolation
374–376overview
373–374Scanning (vulnerability assessment) ...
Get Penetration Tester's Open Source Toolkit, 3rd Edition now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.