|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
KNOVEL_on1148863475 |
003 |
OCoLC |
005 |
20231027140348.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
200404s2020 nju o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d OCLCQ
|d TEFOD
|d UKAHL
|d N$T
|d OCLCF
|d RECBK
|d YDX
|d UAB
|d OCLCO
|d K6U
|d IEEEE
|d UPM
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1148121685
|a 1150884498
|a 1179918674
|a 1224349487
|a 1322785790
|
020 |
|
|
|a 9781119577478
|
020 |
|
|
|a 1119577470
|
020 |
|
|
|a 9781119577461
|q (electronic bk.)
|
020 |
|
|
|a 1119577462
|q (electronic bk.)
|
020 |
|
|
|a 9781394178995
|q (electronic bk.)
|
020 |
|
|
|a 1394178999
|q (electronic bk.)
|
020 |
|
|
|z 1119577489
|
020 |
|
|
|z 9781119577485
|
024 |
7 |
|
|a 10.1002/9781394178995
|2 doi
|
029 |
1 |
|
|a AU@
|b 000067582715
|
029 |
1 |
|
|a AU@
|b 000068601737
|
035 |
|
|
|a (OCoLC)1148863475
|z (OCoLC)1148121685
|z (OCoLC)1150884498
|z (OCoLC)1179918674
|z (OCoLC)1224349487
|z (OCoLC)1322785790
|
037 |
|
|
|a CB4FEF47-B776-4BBD-8F7C-AFD9CF34F6EC
|b OverDrive, Inc.
|n http://www.overdrive.com
|
037 |
|
|
|a 9953204
|b IEEE
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Shimonski, Robert.
|
245 |
1 |
0 |
|a Penetration Testing for Dummies
|
260 |
|
|
|a Newark :
|b John Wiley & Sons, Incorporated,
|c 2020.
|
300 |
|
|
|a 1 online resource (259 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a For dummies
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Intro -- Title Page -- Copyright Page -- Table of Contents -- Introduction -- About This Book -- Foolish Assumptions -- Icons Used in This Book -- What You're Not to Read -- Where to Go from Here -- Part 1 Getting Started with Pen Testing -- Chapter 1 Understanding the Role Pen Testers Play in Security -- Looking at Pen Testing Roles -- Crowdsourced pen testers -- In-house security pro -- Security consultant -- Getting Certified -- Gaining the Basic Skills to Pen Test -- Basic networking -- General security technology -- Systems infrastructure and applications -- Mobile and cloud
|
505 |
8 |
|
|a Introducing Cybercrime -- What You Need to Get Started -- Deciding How and When to Pen Test -- Taking Your First Steps -- Chapter 2 An Overview Look at Pen Testing -- The Goals of Pen Testing -- Protecting assets -- Identifying risk -- Finding vulnerabilities -- Scanning and assessing -- Securing operations -- Responding to incidents -- Scanning Maintenance -- Exclusions and ping sweeps -- Patching -- Antivirus and other technologies -- Compliance -- Hacker Agenda -- Hackivist -- Script kiddie to elite -- White hat -- Grey hat -- Black hat
|
505 |
8 |
|
|a Doing Active Reconnaissance: How Hackers Gather Intelligence -- Chapter 3 Gathering Your Tools -- Considerations for Your Toolkit -- Nessus -- Wireshark -- Kali Linux -- Nmap -- Part 2 Understanding the Different Types of Pen Testing -- Chapter 4 Penetrate and Exploit -- Understanding Vectors and the Art of Hacking -- Examining Types of Penetration Attacks -- Social engineering -- Client-side and server-side attacks -- Password cracking -- Cryptology and Encryption -- SSL/TLS -- SSH -- IPsec -- Using Metasploit Framework and Pro -- Chapter 5 Assumption (Man in the Middle) -- Toolkit Fundamentals
|
505 |
8 |
|
|a Burp Suite -- Wireshark -- Listening In to Collect Data -- Address spoofing -- Eavesdropping -- Packet capture and analysis -- Key loggers -- Card skimmers -- USB drives -- Chapter 6 Overwhelm and Disrupt (DoS/DDoS) -- Toolkit Fundamentals -- Kali -- Kali T50 Mixed Packet Injector tool -- Understanding Denial of Service (DoS) Attacks -- Buffer Overflow Attacks -- Fragmentation Attacks -- Smurf Attacks -- Tiny Packet Attacks -- Xmas Tree Attacks -- Chapter 7 Destroy (Malware) -- Toolkit Fundamentals -- Antivirus software and other tools -- Nessus -- Malware -- Ransomware
|
505 |
8 |
|
|a Other Types of Destroy Attacks -- Chapter 8 Subvert (Controls Bypass) -- Toolkit Fundamentals -- Antivirus software and other tools -- Nmap -- Attack Vectors -- Phishing -- Spoofing -- Malware -- Using malware to find a way in -- Bypassing AV software -- Part 3 Diving In: Preparations and Testing -- Chapter 9 Preparing for the Pen Test -- Handling the Preliminary Logistics -- Holding an initial meeting -- Gaining permission -- Following change control -- Keeping backups -- Having documentation -- Gathering Requirements -- Reviewing past test results -- Consulting the risk register
|
500 |
|
|
|a Coming Up with a Plan
|
520 |
|
|
|a Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results!
|
590 |
|
|
|a Knovel
|b ACADEMIC - Software Engineering
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Testing
|x Data processing.
|
650 |
|
0 |
|a Securities
|x Data processing.
|
650 |
|
0 |
|a Hacking.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Valeurs mobilières
|x Informatique.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
7 |
|a COMPUTERS / Security / Network Security.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Hacking
|2 fast
|
650 |
|
7 |
|a Securities
|x Data processing
|2 fast
|
650 |
|
7 |
|a Testing
|x Data processing
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Shimonski, Robert.
|t Penetration Testing for Dummies.
|d Newark : John Wiley & Sons, Incorporated, ©2020
|z 9781119577485
|
830 |
|
0 |
|a --For dummies.
|
856 |
4 |
0 |
|u https://appknovel.uam.elogim.com/kn/resources/kpPTD00001/toc
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36407467
|
938 |
|
|
|a Recorded Books, LLC
|b RECE
|n rbeEB00831053
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL6147818
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36407468
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2417436
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16712570
|
994 |
|
|
|a 92
|b IZTAP
|