8.3 References

 <  Day Day Up  >  

  • "True Internet Stealth: What Is It? Can It Be Achieved?" (http://lockdowncorp.com/stealth)

  • SANS look at some of the reconnaissance tools. (http://www.sans.org/rr/tools/tools.php)

  • SANS look at network scanning. (http://www.giac.org/practical/GSEC/Ronald_Black_GSEC.pdf)

  • SamSpade.org information-gathering web site. (http://www.samspade.org)

 <  Day Day Up  >  


Security Warrior
Security Warrior
ISBN: 0596005458
EAN: 2147483647
Year: 2004
Pages: 211

Similar book on Amazon

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net