53
edits
Changes
no edit summary
:'''Reading References:'''
<!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=86056&recCount=50&recPointer=0&bibId=263746 Inside the Security Mind, Making the Tough Decisions (E-Book)] (Chapters 1 - 3)--><!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 2: Reconnaissance)-->
:'''YouTube Videos:'''
:'''Reading References:'''
<!-- DEAD LINK::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapter 3)-->
:'''YouTube Videos:'''
:'''Resources:'''
::*[http://atlas.arbor.net/ ATLAS Web-page] (Active Threat Level Analysis System)
<!-- DEAD LINK::*[http://www.sans.org/top-cyber-security-risks/summary.php Top Security Risks 2009 (SANS Institute)]-->
:'''Reading References:'''
<!-- DEAD LINK::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook (E-book)]<br />(Chapter 4 - Pages: )-->
:'''YouTube Videos:'''
:'''Reading References:'''
<!-- DEAD LINKS::*[http://lcweb.senecac.on.ca:2063/0596003919 Linux Security Cookbook]<br />(Chapter 5 - Pages: )--><!-- DEAD LINKS::*[http://lcweb.senecac.on.ca:2063/0131963694?uicode=seneca SELinux by Example]<br />(Chapter x - Pages: )-->
:'''Resources:'''
::*[http://www.youtube.com/watch?v=-hd7XG-b6uk IP Spoofing]
::*[http://www.youtube.com/watch?v=AhTfo6pWBIM Database Injection]
<!-- DEAD LINKS::*[http://www.youtube.com/watch?v=Iyh_w0Ix2bc Password Cracking]-->
:'''Reading References:'''
<!-- DEAD LINKS::* [http://libcat.senecac.on.ca/vwebv/holdingsInfo?searchId=89542&recCount=50&recPointer=0&bibId=315433 Penetration Tester's Open Source Toolkit (E-book)]<br />(Chapters 4,5,6)-->
|