- How to identify security vulnerabilities
- How to use some of the top security tools in order to identify holes
- How to read reports from testing tools
- Common vulnerability types and attacks
- Common Web-based attacks and exposures as well as recommendations for closing those holes
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.