Cargando…

CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits /

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultati...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Tiller, James S.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press, ©2012.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn772692279
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|||||||||
008 120110s2012 flua ob 001 0 eng d
010 |z  2011038737 
040 |a YDXCP  |b eng  |e pn  |c YDXCP  |d N$T  |d E7B  |d OTZ  |d B24X7  |d CDX  |d VLB  |d COO  |d OCLCQ  |d EBLCP  |d OCLCQ  |d DEBSZ  |d OCLCQ  |d OCLCO  |d CRCPR  |d OCLCQ  |d OCLCO  |d UMI  |d DEBBG  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO  |d Z5A  |d IDB  |d LIV  |d MERUC  |d UAB  |d STF  |d OCLCF  |d OCLCQ  |d CEF  |d OCLCQ  |d UKMGB  |d YDX  |d TYFRS  |d OCLCQ  |d UKAHL  |d NLW  |d OCLCQ  |d LEAUB  |d UHL  |d LVT  |d VT2  |d BRF  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCO 
015 |a GBB7A5119  |2 bnb 
016 7 |a 018380546  |2 Uk 
019 |a 879683643  |a 961514056  |a 966355205  |a 1015211218  |a 1086456063  |a 1152821624  |a 1156381084  |a 1192345858 
020 |a 143988028X  |q (electronic bk.) 
020 |a 9781439880289  |q (electronic bk.) 
020 |z 9781439880272  |q (hardcover ;  |q alk. paper) 
020 |z 1439880271  |q (hardcover ;  |q alk. paper) 
020 |a 9781466516847  |q (e-book) 
020 |a 1466516844 
024 8 |a 9786613908766 
029 1 |a AU@  |b 000053281201 
029 1 |a AU@  |b 000062623704 
029 1 |a CHNEW  |b 000602037 
029 1 |a DEBBG  |b BV041135274 
029 1 |a DEBBG  |b BV042032415 
029 1 |a DEBSZ  |b 397191987 
029 1 |a DEBSZ  |b 414178831 
029 1 |a DEBSZ  |b 431076715 
029 1 |a GBVCP  |b 738771562 
029 1 |a GBVCP  |b 882729535 
029 1 |a NZ1  |b 14242569 
029 1 |a UKMGB  |b 018380546 
035 |a (OCoLC)772692279  |z (OCoLC)879683643  |z (OCoLC)961514056  |z (OCoLC)966355205  |z (OCoLC)1015211218  |z (OCoLC)1086456063  |z (OCoLC)1152821624  |z (OCoLC)1156381084  |z (OCoLC)1192345858 
037 |a CL0500000426  |b Safari Books Online 
050 4 |a QA76.9.A25  |b T56 2012 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Tiller, James S. 
245 1 0 |a CISO's guide to penetration testing :  |b a framework to plan, manage, and maximize benefits /  |c James S. Tiller. 
246 3 |a Guide to penetration testing 
260 |a Boca Raton, FL :  |b CRC Press,  |c ©2012. 
300 |a 1 online resource (xiv, 374 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Includes index. 
504 |a Includes bibliographical references and index. 
505 0 |a Ch. 1. Getting started -- ch. 2. Setting the stage -- ch. 3. The framework -- ch. 4. The business perspective -- ch. 5. Planning for a controlled attack -- ch. 6. Preparing for a hack -- ch. 7. Reconnaissance -- ch. 8. Enumeration -- ch. 9. Vulnerability analysis -- ch. 10. Exploitation -- ch. 11. The deliverable -- ch. 12. Integrating the results. 
588 0 |a Print version record. 
520 |a CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of th. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures  |x Testing. 
650 0 |a Business enterprises  |x Data processing. 
650 6 |a Tests d'intrusion. 
650 6 |a Entreprises  |x Informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Business enterprises  |x Data processing  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
776 0 8 |i Print version:  |a Tiller, James S.  |t CISO's guide to penetration testing.  |d Boca Raton, FL : CRC Press, ©2012  |z 9781439880272  |w (DLC) 2011038737  |w (OCoLC)714730274 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781439880289/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH21641783 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24073915 
938 |a Books 24x7  |b B247  |n bks00046430 
938 |a Coutts Information Services  |b COUT  |n 23413012 
938 |a EBL - Ebook Library  |b EBLB  |n EBL826967 
938 |a ebrary  |b EBRY  |n ebr10518019 
938 |a EBSCOhost  |b EBSC  |n 411932 
938 |a Taylor & Francis  |b TAFR  |n AUP0KE13922PDF 
938 |a Taylor & Francis  |b TAFR  |n 9780429184758 
938 |a YBP Library Services  |b YANK  |n 15924326 
938 |a YBP Library Services  |b YANK  |n 7060610 
938 |a YBP Library Services  |b YANK  |n 11934131 
938 |a YBP Library Services  |b YANK  |n 11934132 
994 |a 92  |b IZTAP