Penetration testing essentials.
IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. --
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken, NJ :
Sybex,
2017.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBOOKCENTRAL_ocn964295404 | ||
003 | OCoLC | ||
005 | 20240329122006.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 161125s2017 nju o 000 0 eng d | ||
040 | |a YDX |b eng |e pn |c YDX |d N$T |d EBLCP |d OCLCQ |d IDEBK |d IDB |d OCLCF |d OCLCO |d TEFOD |d OCLCQ |d UPM |d OCLCA |d MERUC |d OCLCQ |d LVT |d CUY |d ZCU |d ICG |d DKC |d OCLCQ |d N$T |d IUL |d UAB |d K6U |d DG1 |d OTZ |d LIV |d DEBSZ |d D6H |d VVB |d RRP |d CEF |d COO |d UKMGB |d WYU |d LOA |d U3W |d G3B |d CNCEN |d S8J |d COCUF |d CNNOR |d VT2 |d UKAHL |d GZM |d NLW |d OCLCQ |d BRF |d OCLCO |d OCLCQ |d OCL |d EYM |d OCLCO |d OCLCQ |d INARC |d OCLCQ |d OCLCO |d OCLCL | ||
015 | |a GBB702339 |2 bnb | ||
016 | 7 | |a 018111807 |2 Uk | |
019 | |a 963932448 |a 965146834 |a 967317070 |a 968630982 |a 971032383 |a 971068062 |a 971219141 |a 976195802 |a 1043774895 |a 1044550279 |a 1045166140 |a 1051132549 |a 1062316653 |a 1088964316 |a 1118665599 |a 1228583795 |a 1272921932 |a 1274605960 | ||
020 | |a 9781119235330 |q (electronic bk.) | ||
020 | |a 1119235332 |q (electronic bk.) | ||
020 | |a 9781119323983 |q (electronic bk.) | ||
020 | |a 1119323983 |q (electronic bk.) | ||
020 | |a 9781119419358 |q (electronic bk.) | ||
020 | |a 1119419352 |q (electronic bk.) | ||
020 | |z 9781119235309 | ||
020 | |z 1119235308 | ||
029 | 1 | |a AU@ |b 000061349497 | |
029 | 1 | |a AU@ |b 000062617075 | |
029 | 1 | |a CHBIS |b 011150730 | |
029 | 1 | |a CHNEW |b 000913223 | |
029 | 1 | |a CHNEW |b 000964854 | |
029 | 1 | |a CHVBK |b 495227196 | |
029 | 1 | |a DEBSZ |b 493821503 | |
029 | 1 | |a GBVCP |b 1000445844 | |
029 | 1 | |a GBVCP |b 1002862590 | |
029 | 1 | |a UKMGB |b 018111807 | |
035 | |a (OCoLC)964295404 |z (OCoLC)963932448 |z (OCoLC)965146834 |z (OCoLC)967317070 |z (OCoLC)968630982 |z (OCoLC)971032383 |z (OCoLC)971068062 |z (OCoLC)971219141 |z (OCoLC)976195802 |z (OCoLC)1043774895 |z (OCoLC)1044550279 |z (OCoLC)1045166140 |z (OCoLC)1051132549 |z (OCoLC)1062316653 |z (OCoLC)1088964316 |z (OCoLC)1118665599 |z (OCoLC)1228583795 |z (OCoLC)1272921932 |z (OCoLC)1274605960 | ||
050 | 4 | |a QA76.9.A25 |b O75 2017eb | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Oriyano, Sean-Philip. | |
245 | 1 | 0 | |a Penetration testing essentials. |
264 | 1 | |a Hoboken, NJ : |b Sybex, |c 2017. | |
300 | |a 1 online resource | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed July 1, 2019) | |
505 | 0 | |a Ch. 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Exploring Networking Concepts -- ch. 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5 Gathering Intelligence -- Introduction to Intelligence Gathering -- Examining a Company's Web Presence | |
505 | 8 | |a Finding Websites That Don't Exist Anymore -- Gathering Information with Search Engines -- Targeting Employees with People Searches -- Discovering Location -- Do Some Social Networking -- Looking via Financial Services -- Investigating Job Boards -- Searching Email -- Extracting Technical Information -- ch. 6 Scanning and Enumeration -- Introduction to Scanning -- Checking for Live Systems -- Performing Port Scanning -- Identifying an Operating System -- Scanning for Vulnerabilities -- Using Proxies (Or Keeping Your Head Down) -- Performing Enumeration -- ch. 7 Conducting Vulnerability Scanning -- Introduction to Vulnerability Scanning -- Recognizing the Limitations of Vulnerability Scanning -- Outlining the Vulnerability Scanning Process -- Types of Scans That Can Be Performed -- ch. 8 Cracking Passwords -- Recognizing Strong Passwords -- Choosing a Password-Cracking Technique -- Executing a Passive Online Attack -- Executing an Active Online Attack | |
505 | 8 | |a Executing an Offline Attack -- Using Nontechnical Methods -- Escalating Privileges -- ch. 9 Retaining Access with Backdoors and Malware -- Deciding How to Attack -- Installing a Backdoor with PsTools -- Opening a Shell with LAN Turtle -- Recognizing Types of Malware -- Launching Viruses -- Launching Worms -- Launching Spyware -- Inserting Trojans -- Installing Rootkits -- ch. 10 Reporting -- Reporting the Test Parameters -- Collecting Information -- Highlighting the Important Information -- Adding Supporting Documentation -- Conducting Quality Assurance -- ch. 11 Working with Defensive and Detection Systems -- Detecting Intrusions -- Recognizing the Signs of an Intrusion -- Evading an IDS -- Breaching a Firewall -- Using Honeypots: The Wolf in Sheep's Clothing -- ch. 12 Covering Your Tracks and Evading Detection -- Recognizing the Motivations for Evasion -- Getting Rid of Log Files -- Hiding Files -- Evading Antivirus Software | |
505 | 8 | |a Evading Defenses by Entering Through a Backdoor -- Using Rootkits for Evasion -- ch. 13 Detecting and Targeting Wireless -- An Introduction to Wireless -- Breaking Wireless Encryption Technologies -- Conducting a Wardriving Attack -- Conducting Other Types of Attack -- Choosing Tools to Attack Wireless -- Knocking Out Bluetooth -- Hacking the Internet of Things (IoT) -- ch. 14 Dealing with Mobile Device Security -- Recognizing Current-Generation Mobile Devices -- Working with Android OS -- Working with Apple iOS -- Finding Security Holes in Mobile Devices -- Encountering Bring Your Own Device (BYOD) -- Choosing Tools to Test Mobile Devices -- ch. 15 Performing Social Engineering -- Introduction to Social Engineering -- Exploiting Human Traits -- Acting Like a Social Engineer -- Targeting Specific Victims -- Leveraging Social Networking -- Conducting Safer Social Networking -- ch. 16 Hardening a Host System -- Introduction to Hardening | |
505 | 8 | |a Three Tenets of Defense -- Creating a Security Baseline -- Hardening with Group Policy -- Hardening Desktop Security -- Backing Up a System -- ch. 17 Hardening Your Network -- Introduction to Network Hardening -- Intrusion Detection Systems -- Firewalls -- Physical Security Controls -- ch. 18 Navigating the Path to Job Success -- Choosing Your Career Path -- Build a Library -- Practice Technical Writing -- Display Your Skills -- ch. 19 Building a Test Lab for Penetration Testing -- Deciding to Build a Lab -- Considering Virtualization -- Getting Starting and What You Will Need -- Installing Software. | |
520 | |a IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. -- |c Edited summary from book. | ||
506 | 1 | |a Legal Deposit; |c Only available on premises controlled by the deposit library and to one user at any one time; |e The Legal Deposit Libraries (Non-Print Works) Regulations (UK). |5 WlAbNL | |
540 | |a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force. |5 WlAbNL | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
590 | |a ProQuest Ebook Central |b Ebook Central Academic Complete | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Hackers. | |
650 | 0 | |a Hacking. | |
650 | 2 | |a Computer Security | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Pirates informatiques. | |
650 | 6 | |a Piratage informatique. | |
650 | 7 | |a Hacking |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer crimes |x Prevention |2 fast | |
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
758 | |i has work: |a Penetration testing essentials (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFy47q8j4YV6fT8hTHkygq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |z 9781119323983 |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781119235309/?ar |z Texto completo |
856 | 4 | 0 | |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5086913 |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH30994290 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH32109554 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL4745627 | ||
938 | |a EBSCOhost |b EBSC |n 1423169 | ||
938 | |a Internet Archive |b INAR |n penetrationtesti0000oriy | ||
938 | |a YBP Library Services |b YANK |n 13270688 | ||
938 | |a YBP Library Services |b YANK |n 14723961 | ||
938 | |a YBP Library Services |b YANK |n 15101268 | ||
994 | |a 92 |b IZTAP |