Three Different Shades of Ethical Hacking: Black, White and Gray

Corporations and other entities are faced with the unenviable task of trying to defend their networks against various types of intrusive attacks. Although traditional methods of deterrence, (i.e. firewalls, intrusion detection devices, etc.) have their place in this battle, there has arisen the...
By David Hafele
May 2, 2004

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg