Cargando…

Penetration Testing For Dummies /

Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking...

Descripción completa

Detalles Bibliográficos
Autor principal: Shimonski, Robert (Autor)
Autor Corporativo: Safari, an O'Reilly Media Company
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [Place of publication not identified] : For Dummies, 2020.
Edición:1st edition.
Colección:--For dummies.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Mi 4500
001 OR_on1228510057
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 101120s2020 xx eo 000 0 eng d
040 |a TOH  |b eng  |c TOH  |d OCLCF  |d OCLCQ 
020 |a 9781119577485 
020 |a 1119577489 
024 8 |a 9781119577485 
035 |a (OCoLC)1228510057 
082 0 4 |a 005.8  |q OCoLC  |2 23/eng/20230216 
049 |a UAMI 
100 1 |a Shimonski, Robert,  |e author. 
245 1 0 |a Penetration Testing For Dummies /  |c Shimonski, Robert. 
250 |a 1st edition. 
264 1 |a [Place of publication not identified] :  |b For Dummies,  |c 2020. 
300 |a 1 online resource (256 pages). 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
365 |b 29.99 
490 1 |a For dummies 
520 |a Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results! 
542 |f Copyright © 2019 by John Wiley and Sons  |g 2019 
550 |a Made available through: Safari, an O'Reilly Media Company. 
588 0 |a Online resource; Title from title page (viewed May 19, 2020). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Hacking. 
650 0 |a Securities  |x Data processing. 
650 0 |a Testing  |x Data processing. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Hacking.  |2 fast  |0 (OCoLC)fst01909643 
650 7 |a Securities  |x Data processing.  |2 fast  |0 (OCoLC)fst01110754 
650 7 |a Testing  |x Data processing.  |2 fast  |0 (OCoLC)fst01148243 
710 2 |a O'Reilly for Higher Education (Firm),  |e distributor. 
710 2 |a Safari, an O'Reilly Media Company. 
776 0 8 |i ebook version :  |z 9781119577461 
830 0 |a --For dummies. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119577485/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP