Op werkdagen voor 23:00 besteld, morgen in huis Gratis verzending vanaf €20

Penetration Testing Basics

A Quick-Start Guide to Breaking into Systems

Paperback Engels 2016 9781484218563
Verwachte levertijd ongeveer 8 werkdagen

Samenvatting

Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible.
What You Will Learn

-Identify security vulnerabilities
-Use some of the top security tools to identify holes
-Read reports from testing tools
-Spot and negate common attacks
-Identify common Web-based attacks and exposures as well as recommendations for closing those holes

Who This Book Is For
Anyone who has some familiarity with computers and an interest in information security and penetration testing.

Specificaties

ISBN13:9781484218563
Taal:Engels
Bindwijze:paperback
Uitgever:Apress
Verschijningsdatum:15-7-2016
Hoofdrubriek:
ISSN:

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Over Ric Messier

Ric Messier, CEH, GCIH, GSEC, CISSP is a consultant, educator, and author of many books on information security and digital forensics. With decades of experience in information technology and information security, Ric has held the varied roles of programmer, system administrator, network engineer, security engineering manager, VoIP engineer, consultant, and professor.

Andere boeken door Ric Messier

Inhoudsopgave

1. What Is Penetration Testing? Information Security
Penetration Testing vs Security Assessments
Who does Penetration Testing

2. Digging for Information Google Hacking
Social Networking
Job Sites
Technical sources (e.g., regional Internet registries)

3. What’s Open? Port scanning
Banner grabbing

4. Vulnerabilities Scanning for vulnerabilities
Nessus vs Nexpose vs OpenVAS
Fuzzing

5. Exploitation Using Metasploit
Exploit Database

6. Breaking Web Sites Common Vulnerabilities< Web Scanning

7. Reporting

Managementboek Top 100

Rubrieken

Populaire producten

    Personen

      Trefwoorden

        Penetration Testing Basics