Professional penetration testing : creating and learning in a hacking lab /
This book walks through the entire process of setting up and running a penetration testing lab for the purpose of testing a computer network to find security vulnerabilities before they are maliciously exploited. Chapters cover planning, metrics, and methodologies; the details of running a pen test,...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Waltham, Mass. :
Syngress,
©2013.
|
Edición: | 2nd ed. |
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Ia 4500 | ||
---|---|---|---|
001 | EBSCO_ocn854754137 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr mn||||||||| | ||
008 | 130731s2013 maua ob 001 0 eng d | ||
040 | |a HKP |b eng |e pn |c HKP |d OCLCO |d UIU |d B24X7 |d UMI |d COO |d TEF |d DEBBG |d GGVRL |d DEBSZ |d OCLCA |d OCLCF |d OCL |d OCLCQ |d AGLDB |d K6U |d OCLCQ |d U3W |d D6H |d OCLCQ |d CEF |d INT |d OCLCQ |d UAB |d C6I |d BRF |d EYM |d OCLCO |d OCLCQ |d OCLCO | ||
019 | |a 865474276 |a 1060196866 |a 1179575629 |a 1194774849 | ||
020 | |a 9780124046184 | ||
020 | |a 0124046185 | ||
020 | |z 1597499935 |q (print) | ||
020 | |z 9781597499934 |q (print) | ||
029 | 1 | |a AU@ |b 000052404283 | |
029 | 1 | |a AU@ |b 000053295451 | |
029 | 1 | |a DEBBG |b BV041777997 | |
029 | 1 | |a DEBBG |b BV042314336 | |
029 | 1 | |a DEBSZ |b 40432472X | |
029 | 1 | |a DEBSZ |b 434139971 | |
029 | 1 | |a DKDLA |b 820120-katalog:000737943 | |
035 | |a (OCoLC)854754137 |z (OCoLC)865474276 |z (OCoLC)1060196866 |z (OCoLC)1179575629 |z (OCoLC)1194774849 | ||
037 | |a CL0500000349 |b Safari Books Online | ||
050 | 4 | |a TK5105.59 |b .W544 2013eb | |
082 | 0 | 4 | |a 005.8068 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Wilhelm, Thomas. | |
245 | 1 | 0 | |a Professional penetration testing : |b creating and learning in a hacking lab / |c Thomas Wilhelm ; Matthew Neely, technical editor. |
246 | 3 | |a Creating and learning in a hacking lab | |
250 | |a 2nd ed. | ||
260 | |a Waltham, Mass. : |b Syngress, |c ©2013. | ||
300 | |a 1 online resource (xvii, 445 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Introduction -- chapter 2. Ethics and hacking -- chapter 3. Setting up your lab -- chapter 4. Methodologies and frameworks -- chapter 5. Pentest project management -- chapter 6. Information gathering -- chapter 7. Vulnerability identification -- chapter 8. Vulnerability exploitation -- chapter 9. Local system attacks -- chapter 10. Privilege escalation -- chapter 11. Targeting support systems -- chapter 12. Targeting the network -- chapter 13. Web application attack techniques -- chapter 14. Reporting results -- chapter 15. Hacking as a career. | |
520 | |a This book walks through the entire process of setting up and running a penetration testing lab for the purpose of testing a computer network to find security vulnerabilities before they are maliciously exploited. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting, and management practices. | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
650 | 0 | |a Computer networks |x Security measures. | |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer networks |x Testing. | |
650 | 0 | |a Hackers. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Pirates informatiques. | |
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer networks |x Testing |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
700 | 1 | |a Neely, Matthew. |4 edt | |
776 | 0 | 8 | |i Print version: |a Wilhelm, Thomas. |t Professional penetration testing. |b 2nd ed. |d Waltham, Mass. : Syngress, ©2013 |z 9781597499934 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781597499934/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=486637 |z Texto completo |
938 | |a Books 24x7 |b B247 |n bks00056567 | ||
938 | |a Cengage Learning |b GVRL |n GVRL8DHP | ||
994 | |a 92 |b IZTAP |