نتایج جستجو برای: penetration test mini
تعداد نتایج: 871388 فیلتر نتایج به سال:
Hand-held spray guns and lances are the most widely used methods of crop protection in greenhouses despite the heavy workload and high risk of operator exposure associated with these techniques (Foqué 2012). These spray application techniques have also proved to be less effective than spray boom equipment under many conditions while the advantages of using vertical boom sprayers compared with u...
Most networks are connected to the Internet through firewalls to block attacks from the outside and to limit communication initiated from the inside. Because of the limited, supposedly safe functionality of the Domain Name System protocol, its traffic is by and large neglected by firewalls. The resulting possibility for setting up information channels through DNS tunnels is already known, but a...
Security has become, nowadays, a major concern for the organizations as the majority of its applications are exposed to Internet, which increases the threats of security considerably. Thus, the solution is to improve tools and mechanisms to strengthen the protection of applications against attacks and ensure the different security objectives. Among solutions we will talking about, in this paper...
Exact reflection and transmission coefficients for supersymmetric shapeinvariant potentials barriers are calculated by an analytical continuation of the asymptotic wave functions obtained via the introduction of new generalized ladder operators. The general form of the wave function is obtained by the use of the F(−∞,+∞)-matrix formalism of Fröman and Fröman which is related to the evolution of...
Web Application finger printing is a quintessential part of the Information Gathering phase of (ethical) hacking. It allows narrowing down the specifics instead of looking for all clues. Also an application that has been correctly recognized can help in quickly analyzing known weaknesses and then moving ahead with remaining aspects. This step is also essential to allow a pen tester to customize...
Penetration testing, the deliberate search for potential vulnerabilities in a system by using attack techniques, is a relevant tool of information security practitioners. This paper adds penetration testing to the realm of information security investment. Penetration testing is modeled as an information gathering option to reduce uncertainty in a discrete time, finite horizon, player-versus-nat...
Background: We aimed to describe the social, demographic and medical characteristics of victims of sexual violence and their association with the lapsed time between the aggression and the search for medical attention, and to identify the possible reasons for delay in access to hospital. Methods: we reviewed the records of 439 female cases of sexual violence, treated through the medical service...
What are the real security issues for a wireless sensor network (WSN) intended to monitor the structural health of a suspension bridge, a subway tunnel or a water distribution pipe? Could an attack on the sensor network cause the structure to collapse? How easy is it for civil engineers or other domain experts to build a secure WSN using commercially available hardware and software? We answer t...
The oxidation behavior of silicon-containing steel was studied by applying segmented heating routes similar to the atmosphere and heating process in an industrial reheating furnace. The oxidation tests were carried out on a simultaneous thermal analyzer at heating temperatures of 1150 ̋C–1300 ̋C. The morphologies of Fe2SiO4 were observed by SEM, and the penetration depths of the Fe2SiO4 layer a...
This paper describes an exercise that combines the business case for penetration testing with the application of the testing and subsequent management reporting. The exercise was designed for students enrolled in information systems and computer science courses to present a more holistic understanding of network and system security within an organization. This paper explains the objectives and ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید