|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_ocn772692279 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
120110s2012 flua ob 001 0 eng d |
010 |
|
|
|z 2011038737
|
040 |
|
|
|a YDXCP
|b eng
|e pn
|c YDXCP
|d N$T
|d E7B
|d OTZ
|d B24X7
|d CDX
|d VLB
|d COO
|d OCLCQ
|d EBLCP
|d OCLCQ
|d DEBSZ
|d OCLCQ
|d OCLCO
|d CRCPR
|d OCLCQ
|d OCLCO
|d UMI
|d DEBBG
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d Z5A
|d IDB
|d LIV
|d MERUC
|d UAB
|d STF
|d OCLCF
|d OCLCQ
|d CEF
|d OCLCQ
|d UKMGB
|d YDX
|d TYFRS
|d OCLCQ
|d UKAHL
|d NLW
|d OCLCQ
|d LEAUB
|d UHL
|d LVT
|d VT2
|d BRF
|d OCLCO
|d OCLCQ
|d SFB
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB7A5119
|2 bnb
|
016 |
7 |
|
|a 018380546
|2 Uk
|
019 |
|
|
|a 879683643
|a 961514056
|a 966355205
|a 1015211218
|a 1086456063
|a 1152821624
|a 1156381084
|a 1192345858
|
020 |
|
|
|a 143988028X
|q (electronic bk.)
|
020 |
|
|
|a 9781439880289
|q (electronic bk.)
|
020 |
|
|
|z 9781439880272
|q (hardcover ;
|q alk. paper)
|
020 |
|
|
|z 1439880271
|q (hardcover ;
|q alk. paper)
|
020 |
|
|
|a 9781466516847
|q (e-book)
|
020 |
|
|
|a 1466516844
|
024 |
8 |
|
|a 9786613908766
|
029 |
1 |
|
|a AU@
|b 000053281201
|
029 |
1 |
|
|a AU@
|b 000062623704
|
029 |
1 |
|
|a CHNEW
|b 000602037
|
029 |
1 |
|
|a DEBBG
|b BV041135274
|
029 |
1 |
|
|a DEBBG
|b BV042032415
|
029 |
1 |
|
|a DEBSZ
|b 397191987
|
029 |
1 |
|
|a DEBSZ
|b 414178831
|
029 |
1 |
|
|a DEBSZ
|b 431076715
|
029 |
1 |
|
|a GBVCP
|b 738771562
|
029 |
1 |
|
|a GBVCP
|b 882729535
|
029 |
1 |
|
|a NZ1
|b 14242569
|
029 |
1 |
|
|a UKMGB
|b 018380546
|
035 |
|
|
|a (OCoLC)772692279
|z (OCoLC)879683643
|z (OCoLC)961514056
|z (OCoLC)966355205
|z (OCoLC)1015211218
|z (OCoLC)1086456063
|z (OCoLC)1152821624
|z (OCoLC)1156381084
|z (OCoLC)1192345858
|
037 |
|
|
|a CL0500000426
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|b T56 2012
|
072 |
|
7 |
|a COM
|x 060040
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 043050
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Tiller, James S.
|
245 |
1 |
0 |
|a CISO's guide to penetration testing :
|b a framework to plan, manage, and maximize benefits /
|c James S. Tiller.
|
246 |
3 |
|
|a Guide to penetration testing
|
260 |
|
|
|a Boca Raton, FL :
|b CRC Press,
|c ©2012.
|
300 |
|
|
|a 1 online resource (xiv, 374 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Includes index.
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Ch. 1. Getting started -- ch. 2. Setting the stage -- ch. 3. The framework -- ch. 4. The business perspective -- ch. 5. Planning for a controlled attack -- ch. 6. Preparing for a hack -- ch. 7. Reconnaissance -- ch. 8. Enumeration -- ch. 9. Vulnerability analysis -- ch. 10. Exploitation -- ch. 11. The deliverable -- ch. 12. Integrating the results.
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of th.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Testing.
|
650 |
|
0 |
|a Business enterprises
|x Data processing.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Entreprises
|x Informatique.
|
650 |
|
7 |
|a COMPUTERS
|x Internet
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x Security.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Business enterprises
|x Data processing
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Tiller, James S.
|t CISO's guide to penetration testing.
|d Boca Raton, FL : CRC Press, ©2012
|z 9781439880272
|w (DLC) 2011038737
|w (OCoLC)714730274
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781439880289/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH21641783
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH24073915
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00046430
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 23413012
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL826967
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10518019
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 411932
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n AUP0KE13922PDF
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9780429184758
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15924326
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 7060610
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11934131
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 11934132
|
994 |
|
|
|a 92
|b IZTAP
|