1
by Linn, Heather, Nutting, Ray
Published 2022
McGraw-Hill Education
Table of Contents: ... -- Chapter 2 Information Gathering and Vulnerability Scanning -- Passive Reconnaissance -- Active...

2
by Sheikh, Ahmed F.
Published 2020
Apress
Table of Contents: ... -- Advantages -- Disadvantages -- Active vs. Passive NIDS -- Signatures -- IDS Matrix -- IDS Detection Models...

3
by Rogers, Bobby E.
Published 2021
McGraw-Hill Education
Table of Contents: ... Identification -- Asset Criticality -- Active vs. Passive Scanning -- Mapping/Enumeration -- Validation -- True...

4
by Chapple, Mike, Seidl, David
Published 2021
John Wiley & Sons, Inc.
Table of Contents: ... Frequency 118 -- Active vs. Passive Scanning 120 -- Configuring and Executing Vulnerability Scans 121...

5
by Messier, Ric
Published 2021
Sybex, a Wiley brand
Table of Contents: ... Transfers 130 -- Passive DNS 133 --...

6
by Sheikh, Ahmed
Published 2021
Apress L.P.
... along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability...

7
Published 2021
Pearson IT Certification
... and passively gather information about targets through online information gathering, scanning, and enumeration...

8
by Meyers, Mike
Published 2023
McGraw-Hill Education
Table of Contents: ...-Passive -- Mean Time to Repair (MTTR) -- Mean Time Between Failure (MTBF) -- Recovery Time Objective (RTO...

9
by Greene, Sari Stern
Published 2024
Pearson
... Files, Malware Analysis, Passive Reconnaissance, RAM Capture, Quantitative Risk Analysis, and Threat...

10
by Sequeira, Anthony
Published 2008
Cisco Press
... written and lectured to massive audiences about the latest in networking technologies. He is currently a...

13
Published 2023
Pearson