White Papers

Paper aims to provide basic concepts in regards of vulnerability assessments, reader should have some basic technical IT knowledge to understand them, however this paper does not aim to be an in depth technical reference.


How to detect system intrusions? What are the techniques? Can one character difference in the output be an indicator of compromise? Download and read a white paper below if you want answers to these questions and more.


Leave a Reply

Your email address will not be published.

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>