Cargando…

Penetration testing essentials.

IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. --

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Oriyano, Sean-Philip
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, NJ : Sybex, 2017.
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 a 4500
001 EBOOKCENTRAL_ocn964295404
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 161125s2017 nju o 000 0 eng d
040 |a YDX  |b eng  |e pn  |c YDX  |d N$T  |d EBLCP  |d OCLCQ  |d IDEBK  |d IDB  |d OCLCF  |d OCLCO  |d TEFOD  |d OCLCQ  |d UPM  |d OCLCA  |d MERUC  |d OCLCQ  |d LVT  |d CUY  |d ZCU  |d ICG  |d DKC  |d OCLCQ  |d N$T  |d IUL  |d UAB  |d K6U  |d DG1  |d OTZ  |d LIV  |d DEBSZ  |d D6H  |d VVB  |d RRP  |d CEF  |d COO  |d UKMGB  |d WYU  |d LOA  |d U3W  |d G3B  |d CNCEN  |d S8J  |d COCUF  |d CNNOR  |d VT2  |d UKAHL  |d GZM  |d NLW  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ  |d OCL  |d EYM  |d OCLCO  |d OCLCQ  |d INARC  |d OCLCQ  |d OCLCO  |d OCLCL 
015 |a GBB702339  |2 bnb 
016 7 |a 018111807  |2 Uk 
019 |a 963932448  |a 965146834  |a 967317070  |a 968630982  |a 971032383  |a 971068062  |a 971219141  |a 976195802  |a 1043774895  |a 1044550279  |a 1045166140  |a 1051132549  |a 1062316653  |a 1088964316  |a 1118665599  |a 1228583795  |a 1272921932  |a 1274605960 
020 |a 9781119235330  |q (electronic bk.) 
020 |a 1119235332  |q (electronic bk.) 
020 |a 9781119323983  |q (electronic bk.) 
020 |a 1119323983  |q (electronic bk.) 
020 |a 9781119419358  |q (electronic bk.) 
020 |a 1119419352  |q (electronic bk.) 
020 |z 9781119235309 
020 |z 1119235308 
029 1 |a AU@  |b 000061349497 
029 1 |a AU@  |b 000062617075 
029 1 |a CHBIS  |b 011150730 
029 1 |a CHNEW  |b 000913223 
029 1 |a CHNEW  |b 000964854 
029 1 |a CHVBK  |b 495227196 
029 1 |a DEBSZ  |b 493821503 
029 1 |a GBVCP  |b 1000445844 
029 1 |a GBVCP  |b 1002862590 
029 1 |a UKMGB  |b 018111807 
035 |a (OCoLC)964295404  |z (OCoLC)963932448  |z (OCoLC)965146834  |z (OCoLC)967317070  |z (OCoLC)968630982  |z (OCoLC)971032383  |z (OCoLC)971068062  |z (OCoLC)971219141  |z (OCoLC)976195802  |z (OCoLC)1043774895  |z (OCoLC)1044550279  |z (OCoLC)1045166140  |z (OCoLC)1051132549  |z (OCoLC)1062316653  |z (OCoLC)1088964316  |z (OCoLC)1118665599  |z (OCoLC)1228583795  |z (OCoLC)1272921932  |z (OCoLC)1274605960 
050 4 |a QA76.9.A25  |b O75 2017eb 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Oriyano, Sean-Philip. 
245 1 0 |a Penetration testing essentials. 
264 1 |a Hoboken, NJ :  |b Sybex,  |c 2017. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from PDF title page (EBSCO, viewed July 1, 2019) 
505 0 |a Ch. 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Exploring Networking Concepts -- ch. 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5 Gathering Intelligence -- Introduction to Intelligence Gathering -- Examining a Company's Web Presence 
505 8 |a Finding Websites That Don't Exist Anymore -- Gathering Information with Search Engines -- Targeting Employees with People Searches -- Discovering Location -- Do Some Social Networking -- Looking via Financial Services -- Investigating Job Boards -- Searching Email -- Extracting Technical Information -- ch. 6 Scanning and Enumeration -- Introduction to Scanning -- Checking for Live Systems -- Performing Port Scanning -- Identifying an Operating System -- Scanning for Vulnerabilities -- Using Proxies (Or Keeping Your Head Down) -- Performing Enumeration -- ch. 7 Conducting Vulnerability Scanning -- Introduction to Vulnerability Scanning -- Recognizing the Limitations of Vulnerability Scanning -- Outlining the Vulnerability Scanning Process -- Types of Scans That Can Be Performed -- ch. 8 Cracking Passwords -- Recognizing Strong Passwords -- Choosing a Password-Cracking Technique -- Executing a Passive Online Attack -- Executing an Active Online Attack 
505 8 |a Executing an Offline Attack -- Using Nontechnical Methods -- Escalating Privileges -- ch. 9 Retaining Access with Backdoors and Malware -- Deciding How to Attack -- Installing a Backdoor with PsTools -- Opening a Shell with LAN Turtle -- Recognizing Types of Malware -- Launching Viruses -- Launching Worms -- Launching Spyware -- Inserting Trojans -- Installing Rootkits -- ch. 10 Reporting -- Reporting the Test Parameters -- Collecting Information -- Highlighting the Important Information -- Adding Supporting Documentation -- Conducting Quality Assurance -- ch. 11 Working with Defensive and Detection Systems -- Detecting Intrusions -- Recognizing the Signs of an Intrusion -- Evading an IDS -- Breaching a Firewall -- Using Honeypots: The Wolf in Sheep's Clothing -- ch. 12 Covering Your Tracks and Evading Detection -- Recognizing the Motivations for Evasion -- Getting Rid of Log Files -- Hiding Files -- Evading Antivirus Software 
505 8 |a Evading Defenses by Entering Through a Backdoor -- Using Rootkits for Evasion -- ch. 13 Detecting and Targeting Wireless -- An Introduction to Wireless -- Breaking Wireless Encryption Technologies -- Conducting a Wardriving Attack -- Conducting Other Types of Attack -- Choosing Tools to Attack Wireless -- Knocking Out Bluetooth -- Hacking the Internet of Things (IoT) -- ch. 14 Dealing with Mobile Device Security -- Recognizing Current-Generation Mobile Devices -- Working with Android OS -- Working with Apple iOS -- Finding Security Holes in Mobile Devices -- Encountering Bring Your Own Device (BYOD) -- Choosing Tools to Test Mobile Devices -- ch. 15 Performing Social Engineering -- Introduction to Social Engineering -- Exploiting Human Traits -- Acting Like a Social Engineer -- Targeting Specific Victims -- Leveraging Social Networking -- Conducting Safer Social Networking -- ch. 16 Hardening a Host System -- Introduction to Hardening 
505 8 |a Three Tenets of Defense -- Creating a Security Baseline -- Hardening with Group Policy -- Hardening Desktop Security -- Backing Up a System -- ch. 17 Hardening Your Network -- Introduction to Network Hardening -- Intrusion Detection Systems -- Firewalls -- Physical Security Controls -- ch. 18 Navigating the Path to Job Success -- Choosing Your Career Path -- Build a Library -- Practice Technical Writing -- Display Your Skills -- ch. 19 Building a Test Lab for Penetration Testing -- Deciding to Build a Lab -- Considering Virtualization -- Getting Starting and What You Will Need -- Installing Software. 
520 |a IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. --  |c Edited summary from book. 
506 1 |a Legal Deposit;  |c Only available on premises controlled by the deposit library and to one user at any one time;  |e The Legal Deposit Libraries (Non-Print Works) Regulations (UK).  |5 WlAbNL 
540 |a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.  |5 WlAbNL 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security. 
650 0 |a Hackers. 
650 0 |a Hacking. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Pirates informatiques. 
650 6 |a Piratage informatique. 
650 7 |a Hacking  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Computer crimes  |x Prevention  |2 fast 
650 7 |a Hackers  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
758 |i has work:  |a Penetration testing essentials (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCFy47q8j4YV6fT8hTHkygq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |z 9781119323983 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781119235309/?ar  |z Texto completo 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5086913  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH30994290 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32109554 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4745627 
938 |a EBSCOhost  |b EBSC  |n 1423169 
938 |a Internet Archive  |b INAR  |n penetrationtesti0000oriy 
938 |a YBP Library Services  |b YANK  |n 13270688 
938 |a YBP Library Services  |b YANK  |n 14723961 
938 |a YBP Library Services  |b YANK  |n 15101268 
994 |a 92  |b IZTAP