First Page | Document Content | |
---|---|---|
Date: 2014-06-06 17:54:09Computer network security Software testing Rapid7 Metasploit Project Penetration test Phishing Attack Exploit HD Moore Software Computer security System software | case study | Lumenate Keeps Customers Secure with Rapid7 Metasploit and Nexpose How does a security professional measure success? Ben Holder, a senior security consultant at Lumenate, a technical consulting firm focusedAdd to Reading ListSource URL: www.rapid7.comDownload Document from Source WebsiteFile Size: 203,03 KBShare Document on Facebook |
224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,DocID: 1qjK6 - View Document | |
Metasploit and Money Black Hat DC 2010 hdm[at]metasploit.com Abstract In 2008, Metasploit expanded from a community-run project to a corporate product managed byDocID: 1pX1w - View Document | |
Metasploit and Money Black Hat DC 2010 hdm[at]metasploit.com Abstract In 2008, Metasploit expanded from a community-run project to a corporate product managed byDocID: 1pRQd - View Document | |
Metasm a ruby (dis)assembler Yoann Guillot 20 october 2007DocID: 1pBUY - View Document | |
William Owen Redwood Contact Information Department of Computer Science The Florida State UniversityDocID: 1npkL - View Document |