Chapter 21. Fine-Tuning the Evaluation
Introduction
This chapter covers the remainder of the scanning, or hands-on, portion of the IEM. As mentioned in the previous chapter, you will more than likely have a different view of the system when you’re at the console than when you’re evaluating the system from the network. The same can be said of the remaining tasks, in regard to the organization’s INFOSEC posture. By conducting network device analysis, ...
Get The Best Damn IT Security Management Book Period now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.