Cargando…

Conducting network penetration and espionage in a global environment /

"When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of com...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Middleton, Bruce, 1953- (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press, ©2014.
©20
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn879550804
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 140510s2014 flu ob 001 0 eng d
010 |a  2013047380 
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d N$T  |d E7B  |d YDXCP  |d QGK  |d COO  |d CRCPR  |d OCLCQ  |d B24X7  |d OCLCF  |d UMI  |d DEBBG  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d IDB  |d Z5A  |d PIFBY  |d LIV  |d MERUC  |d UAB  |d OCLCQ  |d VT2  |d OCLCQ  |d D6H  |d OCLCQ  |d CEF  |d OCLCQ  |d U3W  |d NLE  |d OCLCQ  |d UKMGB  |d WYU  |d YDX  |d TYFRS  |d LEAUB  |d AU@  |d OCLCQ  |d UKAHL  |d OCLCQ  |d ERF  |d OCLCQ  |d ZCU  |d SFB  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d OCLCQ 
015 |a GBB7A1448  |2 bnb 
016 7 |a 018373258  |2 Uk 
019 |a 904285373  |a 966355530  |a 1008949201  |a 1065705821  |a 1103255350  |a 1129353860  |a 1153000247  |a 1192334556  |a 1240535079  |a 1259156931  |a 1260357984 
020 |a 9781482206487  |q (electronic bk.) 
020 |a 148220648X  |q (electronic bk.) 
020 |z 9781482206470  |q (hardback) 
020 |z 1482206471  |q (hardback) 
020 |a 9780429171253  |q (electronic bk.) 
020 |a 0429171250  |q (electronic bk.) 
020 |a 1498760295 
020 |a 9781498760294 
024 7 |a 10.1201/b16797  |2 doi 
029 1 |a AU@  |b 000055975885 
029 1 |a AU@  |b 000062434347 
029 1 |a AU@  |b 000065158227 
029 1 |a DEBBG  |b BV042682602 
029 1 |a DEBBG  |b BV043607047 
029 1 |a DEBSZ  |b 446577995 
029 1 |a DEBSZ  |b 463016122 
029 1 |a NZ1  |b 16177032 
029 1 |a UKMGB  |b 018373258 
035 |a (OCoLC)879550804  |z (OCoLC)904285373  |z (OCoLC)966355530  |z (OCoLC)1008949201  |z (OCoLC)1065705821  |z (OCoLC)1103255350  |z (OCoLC)1129353860  |z (OCoLC)1153000247  |z (OCoLC)1192334556  |z (OCoLC)1240535079  |z (OCoLC)1259156931  |z (OCoLC)1260357984 
037 |a CL0500000560  |b Safari Books Online 
050 4 |a TK5105.59  |b .M53 2014 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
084 |a COM053000  |a LAW041000  |a POL012000  |2 bisacsh 
049 |a UAMI 
100 1 |a Middleton, Bruce,  |d 1953-  |e author.  |1 https://id.oclc.org/worldcat/entity/E39PCjxwkdttKmRmbqXxwmy9j3 
245 1 0 |a Conducting network penetration and espionage in a global environment /  |c Bruce Middleton. 
260 |a Boca Raton, FL :  |b CRC Press,  |c ©2014. 
264 4 |c ©20 
300 |a 1 online resource (xiii, 585 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
588 0 |a PDF. 
500 |a Includes index. 
505 0 |a 1. What You Need to Know First -- 2. Attack from Christmas Island -- 3. Indirect Target Information Acquisition (ITIA) -- 4. Direct Target Information Acquisition (DTIA) -- 5. Nmap -- 6. MATLAB, SimuLink, and R -- 7. Metasploit Pro -- 8. China, Syria, and the American Intelligence Community -- 9. Building a Penetration Testing Lab -- 10. Vendor Default Passwords and Default Unix Ports -- 11. Oldies but Goodies If You Have Physical Access -- 12. Order of Operations for Your Tools -- 13. Using Your iPhone as a Network Scanner. 
520 |a "When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks."--  |c Provided by publisher. 
504 |a Includes bibliographical references and index. 
546 |a English. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Penetration testing (Computer security) 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Tests d'intrusion. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
758 |i has work:  |a Conducting network penetration and espionage in a global environment (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFQQ3HhgrHQXDxx94bbRgC  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Middleton, Bruce, 1953-  |t Conducting network penetration and espionage in a global environment.  |d Boca Raton, Florida : CRC Press, ©2014  |h xiii, 564 pages  |z 9781482206470 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1591686  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781482206470/?ar  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH29179836 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25300746 
938 |a Books 24x7  |b B247  |n bks00061787 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1591686 
938 |a ebrary  |b EBRY  |n ebr10867598 
938 |a EBSCOhost  |b EBSC  |n 772959 
938 |a Taylor & Francis  |b TAFR  |n AUP0KE23937PDF 
938 |a Taylor & Francis  |b TAFR  |n 9780429171253 
938 |a YBP Library Services  |b YANK  |n 15923246 
938 |a YBP Library Services  |b YANK  |n 11635281 
938 |a YBP Library Services  |b YANK  |n 12585146 
994 |a 92  |b IZTAP