From: JM (mattox@secnetops.com)
Date: Tue Oct 05 2004 - 13:12:41 EDT
One of the many out there I am sure:
On Tue, 2004-10-05 at 14:45 +0000, Billy Dodson wrote:
> Anyone have any documents they are willing to share on the scope of work
> for a pen-test? I have looked online but was unable to find any available
> documentation. If anyone could provide me with a some links or
> documentation outlining a pen-test/network audit it would be greatly
> appreciated.
>
> ------------------------------------------------------------------------------
> Internet Security Systems. - Keeping You Ahead of the Threat
>
> When business losses are measured in seconds, Internet threats must be stopped before they impact your network. To learn how Internet Security Systems keeps organizations ahead of the threat with preemptive intrusion prevention, download the new whitepaper, Defining the Rules of Preemptive Protection, and end your reliance on reactive security technology.
>
> http://www.securityfocus.com/sponsor/ISS_pen-test_041001
> -------------------------------------------------------------------------------
>
------------------------------------------------------------------------------
Internet Security Systems. - Keeping You Ahead of the Threat
When business losses are measured in seconds, Internet threats must be stopped before they impact your network. To learn how Internet Security Systems keeps organizations ahead of the threat with preemptive intrusion prevention, download the new whitepaper, Defining the Rules of Preemptive Protection, and end your reliance on reactive security technology.
http://www.securityfocus.com/sponsor/ISS_pen-test_041001
-------------------------------------------------------------------------------
This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:54:07 EDT