Cargando…

Procuring penetration testing services.

This book discusses using penetration testing to secure an organization's IT environment while continuing to meet its business and brand objectives. The threat to key systems is increasing; the probability of a security weakness being accidentally exposed or maliciously exploited must be contin...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: Crest
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, Cambridge, UK : IT Governance Pub., 2014.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 JSTOR_ocn888035952
003 OCoLC
005 20231005004200.0
006 m o d
007 cr unu||||||||
008 140820s2014 enka o 000 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d EBLCP  |d STF  |d DEBSZ  |d B24X7  |d DEBBG  |d COO  |d YDXCP  |d JSTOR  |d OCLCF  |d OCLCQ  |d LIV  |d MERUC  |d OCLCQ  |d IOG  |d CEF  |d OCLCQ  |d LVT  |d UAB  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ 
019 |a 957735651 
020 |a 9781849285766  |q (electronic bk.) 
020 |a 1849285764  |q (electronic bk.) 
020 |z 1849285764 
020 |z 1849285756 
020 |z 9781849285759 
029 1 |a AU@  |b 000056008058 
029 1 |a DEBBG  |b BV042182349 
029 1 |a DEBSZ  |b 415542979 
029 1 |a DEBSZ  |b 417230281 
035 |a (OCoLC)888035952  |z (OCoLC)957735651 
037 |a CL0500000466  |b Safari Books Online 
037 |a 22573/ctt14zp6gg  |b JSTOR 
050 4 |a QA76.9.A25  |b .P763 2014 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8 
049 |a UAMI 
245 0 0 |a Procuring penetration testing services. 
260 |a Ely, Cambridge, UK :  |b IT Governance Pub.,  |c 2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed August 9, 2014). 
520 |a This book discusses using penetration testing to secure an organization's IT environment while continuing to meet its business and brand objectives. The threat to key systems is increasing; the probability of a security weakness being accidentally exposed or maliciously exploited must be continually assessed to ensure that the level of risk is at an acceptable level for the business. A penetration test involves the use of a variety of manual and automated techniques to simulate an attack on an organization's information security arrangements. When carried out and reported properly, it can yield knowledge of nearly all technical security weaknesses and provide the information and support required to remove or reduce them. Other significant benefits of effective penetration testing can include: a reduction in IT costs over the long term; improvements in the technical environment, reducing support calls; greater levels of confidence in the security of IT environments; and increased awareness of the need for appropriate technical controls. --  |c Edited summary from book. 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR All Purchased 
650 0 |a Penetration testing (Computer security) 
650 6 |a Tests d'intrusion. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
710 2 |a Crest. 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt155j45x  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00069069 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1778766 
938 |a YBP Library Services  |b YANK  |n 12023455 
994 |a 92  |b IZTAP