|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
OR_on1228510057 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
101120s2020 xx eo 000 0 eng d |
040 |
|
|
|a TOH
|b eng
|c TOH
|d OCLCF
|d OCLCQ
|
020 |
|
|
|a 9781119577485
|
020 |
|
|
|a 1119577489
|
024 |
8 |
|
|a 9781119577485
|
035 |
|
|
|a (OCoLC)1228510057
|
082 |
0 |
4 |
|a 005.8
|q OCoLC
|2 23/eng/20230216
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Shimonski, Robert,
|e author.
|
245 |
1 |
0 |
|a Penetration Testing For Dummies /
|c Shimonski, Robert.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b For Dummies,
|c 2020.
|
300 |
|
|
|a 1 online resource (256 pages).
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
365 |
|
|
|b 29.99
|
490 |
1 |
|
|a For dummies
|
520 |
|
|
|a Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results!
|
542 |
|
|
|f Copyright © 2019 by John Wiley and Sons
|g 2019
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
0 |
|
|a Online resource; Title from title page (viewed May 19, 2020).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hacking.
|
650 |
|
0 |
|a Securities
|x Data processing.
|
650 |
|
0 |
|a Testing
|x Data processing.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Hacking.
|2 fast
|0 (OCoLC)fst01909643
|
650 |
|
7 |
|a Securities
|x Data processing.
|2 fast
|0 (OCoLC)fst01110754
|
650 |
|
7 |
|a Testing
|x Data processing.
|2 fast
|0 (OCoLC)fst01148243
|
710 |
2 |
|
|a O'Reilly for Higher Education (Firm),
|e distributor.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
776 |
0 |
8 |
|i ebook version :
|z 9781119577461
|
830 |
|
0 |
|a --For dummies.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119577485/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|