|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
JSTOR_ocn808857161 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr zn||||||||| |
008 |
120728s2012 enka ob 000 0 eng d |
040 |
|
|
|a B24X7
|b eng
|e pn
|c B24X7
|d OCLCO
|d OCLCQ
|d N$T
|d MHW
|d YDXCP
|d UMI
|d MEAUC
|d COO
|d DEBSZ
|d JSTOR
|d OCLCF
|d OCLCQ
|d CUS
|d JBG
|d AGLDB
|d LIV
|d MERUC
|d OCLCQ
|d LND
|d IOG
|d OCLCA
|d VTS
|d CEF
|d AU@
|d OCLCQ
|d LVT
|d STF
|d M8D
|d UKAHL
|d UX1
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 857306738
|a 1058173884
|a 1175636536
|
020 |
|
|
|a 9781849283724
|q (electronic bk.)
|
020 |
|
|
|a 1849283729
|q (electronic bk.)
|
020 |
|
|
|a 9781849283731
|
020 |
|
|
|a 1849283737
|
020 |
|
|
|z 1849283710
|
020 |
|
|
|z 9781849283717
|
029 |
1 |
|
|a AU@
|b 000052007056
|
029 |
1 |
|
|a AU@
|b 000053282852
|
029 |
1 |
|
|a DEBBG
|b BV041431777
|
029 |
1 |
|
|a DEBBG
|b BV043082095
|
029 |
1 |
|
|a DEBSZ
|b 397540280
|
029 |
1 |
|
|a DEBSZ
|b 398276412
|
029 |
1 |
|
|a DEBSZ
|b 421257644
|
029 |
1 |
|
|a AU@
|b 000065314067
|
029 |
1 |
|
|a AU@
|b 000067093616
|
035 |
|
|
|a (OCoLC)808857161
|z (OCoLC)857306738
|z (OCoLC)1058173884
|z (OCoLC)1175636536
|
037 |
|
|
|a CL0500000268
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt4k5k9s
|b JSTOR
|
050 |
|
4 |
|a TK5105.59
|b .H46 2012eb
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Henry, Kevin M.,
|e author.
|
245 |
1 |
0 |
|a Penetration testing :
|b protecting networks and systems /
|c Kevin M. Henry.
|
260 |
|
|
|a Ely, Cambridgeshire, U.K. :
|b IT Governance Pub.,
|c 2012.
|
300 |
|
|
|a 1 online resource
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
520 |
|
|
|a This book is a preparation guide for the CPTE examination, yet is also a general reference for experienced penetration testers, ethical hackers, auditors, security personnel and anyone else involved in the security of an organization's computer systems.
|
505 |
0 |
|
|a Introduction; Chapter 1: Introduction to Penetration Testing; Case study; Security basics; Risk management; The threat environment; Overview of the steps to penetration testing; Penetration testing versus hacking; Benefits of penetration testing; Summary; Key learning points; Questions; Chapter 2: Preparing to Conduct a Penetration Test; Approval and scope; Planning; Summary; Questions; Chapter 3: Reconnaissance; The start of the test; Physical information gathering; Other data sources; Avoiding footprinting; Key learning points; Questions; Chapter 4: Active Reconnaissance and Enumeration.
|
505 |
8 |
|
|a Port scanningCountermeasures to active reconnaissance; Key learning points; Questions; Chapter 5: Vulnerability Assessments; The attack vectors; References and sources of vulnerabilities; Using vulnerability assessment tools; PCI DSS requirements; Malicious code; Reporting on the vulnerability assessment; Key learning points; Questions; Chapter 6: Hacking Windows® and Unix; Having fun; Common hacking initiatives; Defeating data theft; Protecting against unauthorized access; Access controls; Actions of the attacker; Focus on UNIX/Linux; Advanced attacks; Source code review.
|
505 |
8 |
|
|a Case study: Attack on a Chinese bankKey learning points; Questions; Chapter 7: Launching the Attack; Steps to an exploit; Attacking wireless networks; Pen testing wireless; Network sniffing; Firewalls; Intrusion detection and prevention systems (IDS/IPS); Key learning points; Questions; Chapter 8: Attacking Web Applications; The steps in attacking a web application; Questions; Chapter 9: Preparing the Report; Determining risk levels; Risk response; Report confidentiality; Delivering the report; Key learning points; Questions; Appendix 1: Linux; Appendix 2: Encryption; Concepts of cryptography.
|
505 |
8 |
|
|a Appendix 3: Regulations and LegislationExamples of regulations and legislation; Protection of intellectual property; Appendix 4: Incident Management; Concepts of incident management; Additional Questions and Answers; Answers; References; ITG Resources.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security
|x Evaluation.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique
|x Évaluation.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|x Evaluation
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt5hh74m
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH26414551
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00047049
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 571566
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10678284
|
994 |
|
|
|a 92
|b IZTAP
|