Chapter 2 Reconnaissance. Objectives Identify various techniques for performing reconnaissance Distinguish and discuss the methods used in social engineering.
Computer Security and Penetration Testing Chapter 11 Denial-of-Service Attacks.