Cargando…

Penetration testing : protecting networks and systems /

This book is a preparation guide for the CPTE examination, yet is also a general reference for experienced penetration testers, ethical hackers, auditors, security personnel and anyone else involved in the security of an organization's computer systems.

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Henry, Kevin M. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, Cambridgeshire, U.K. : IT Governance Pub., 2012.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 JSTOR_ocn808857161
003 OCoLC
005 20231005004200.0
006 m o d
007 cr zn|||||||||
008 120728s2012 enka ob 000 0 eng d
040 |a B24X7  |b eng  |e pn  |c B24X7  |d OCLCO  |d OCLCQ  |d N$T  |d MHW  |d YDXCP  |d UMI  |d MEAUC  |d COO  |d DEBSZ  |d JSTOR  |d OCLCF  |d OCLCQ  |d CUS  |d JBG  |d AGLDB  |d LIV  |d MERUC  |d OCLCQ  |d LND  |d IOG  |d OCLCA  |d VTS  |d CEF  |d AU@  |d OCLCQ  |d LVT  |d STF  |d M8D  |d UKAHL  |d UX1  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 857306738  |a 1058173884  |a 1175636536 
020 |a 9781849283724  |q (electronic bk.) 
020 |a 1849283729  |q (electronic bk.) 
020 |a 9781849283731 
020 |a 1849283737 
020 |z 1849283710 
020 |z 9781849283717 
029 1 |a AU@  |b 000052007056 
029 1 |a AU@  |b 000053282852 
029 1 |a DEBBG  |b BV041431777 
029 1 |a DEBBG  |b BV043082095 
029 1 |a DEBSZ  |b 397540280 
029 1 |a DEBSZ  |b 398276412 
029 1 |a DEBSZ  |b 421257644 
029 1 |a AU@  |b 000065314067 
029 1 |a AU@  |b 000067093616 
035 |a (OCoLC)808857161  |z (OCoLC)857306738  |z (OCoLC)1058173884  |z (OCoLC)1175636536 
037 |a CL0500000268  |b Safari Books Online 
037 |a 22573/ctt4k5k9s  |b JSTOR 
050 4 |a TK5105.59  |b .H46 2012eb 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Henry, Kevin M.,  |e author. 
245 1 0 |a Penetration testing :  |b protecting networks and systems /  |c Kevin M. Henry. 
260 |a Ely, Cambridgeshire, U.K. :  |b IT Governance Pub.,  |c 2012. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
504 |a Includes bibliographical references. 
520 |a This book is a preparation guide for the CPTE examination, yet is also a general reference for experienced penetration testers, ethical hackers, auditors, security personnel and anyone else involved in the security of an organization's computer systems. 
505 0 |a Introduction; Chapter 1: Introduction to Penetration Testing; Case study; Security basics; Risk management; The threat environment; Overview of the steps to penetration testing; Penetration testing versus hacking; Benefits of penetration testing; Summary; Key learning points; Questions; Chapter 2: Preparing to Conduct a Penetration Test; Approval and scope; Planning; Summary; Questions; Chapter 3: Reconnaissance; The start of the test; Physical information gathering; Other data sources; Avoiding footprinting; Key learning points; Questions; Chapter 4: Active Reconnaissance and Enumeration. 
505 8 |a Port scanningCountermeasures to active reconnaissance; Key learning points; Questions; Chapter 5: Vulnerability Assessments; The attack vectors; References and sources of vulnerabilities; Using vulnerability assessment tools; PCI DSS requirements; Malicious code; Reporting on the vulnerability assessment; Key learning points; Questions; Chapter 6: Hacking Windows® and Unix; Having fun; Common hacking initiatives; Defeating data theft; Protecting against unauthorized access; Access controls; Actions of the attacker; Focus on UNIX/Linux; Advanced attacks; Source code review. 
505 8 |a Case study: Attack on a Chinese bankKey learning points; Questions; Chapter 7: Launching the Attack; Steps to an exploit; Attacking wireless networks; Pen testing wireless; Network sniffing; Firewalls; Intrusion detection and prevention systems (IDS/IPS); Key learning points; Questions; Chapter 8: Attacking Web Applications; The steps in attacking a web application; Questions; Chapter 9: Preparing the Report; Determining risk levels; Risk response; Report confidentiality; Delivering the report; Key learning points; Questions; Appendix 1: Linux; Appendix 2: Encryption; Concepts of cryptography. 
505 8 |a Appendix 3: Regulations and LegislationExamples of regulations and legislation; Protection of intellectual property; Appendix 4: Incident Management; Concepts of incident management; Additional Questions and Answers; Answers; References; ITG Resources. 
590 |a JSTOR  |b Books at JSTOR All Purchased 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security  |x Evaluation. 
650 6 |a Tests d'intrusion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique  |x Évaluation. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |x Evaluation  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh74m  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH26414551 
938 |a Books 24x7  |b B247  |n bks00047049 
938 |a EBSCOhost  |b EBSC  |n 571566 
938 |a YBP Library Services  |b YANK  |n 10678284 
994 |a 92  |b IZTAP