assessing with VLAD the Scanner, 79
assessment, 75
defining, 76
establishing a methodology, 77
testing, 76
W
white hat hacker (see hackers)
Wi-Fi networks (see 802.11x)
wireless security, 98
802.11x, 98
workstation security, 21
BIOS, 21
boot loaders
passwords, 22
evaluating
administrative control, 21
BIOS, 21
boot loaders, 21
communications, 21
passwords, 21
personal firewalls, 21
X
xinetd, 34
managing resources with, 41
preventing DoS with, 41
SENSOR trap, 41
123