Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
AutomAteD VulnerAbility ScAnnerS 121
invoice amounts by 90%, when it is certainly not in their best inter-
ests to do so, and tells you to reduce your security service quality
down from being a top regional player to the level of fast food, do
you necessarily have to do as they ask? In fact, fast food is a bad anal-
ogy because it is possible to overcook or undercook a pre-prepared,
thawed hamburger. It is even harder to do a bad job of an autoscan—
although I did hear of a case where the wrong IP addresses were
congured and the analyst wound up scanning the U.S. National
Security Agency.
False Positive Testing Revelations
e methodology employed by a manual penetration testing expert
and the operations performed by an autoscanner are simi
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355