CISO's guide to penetration testing a framework to plan, manage, and maximize benefits
CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultati...
Main Author: | |
---|---|
Format: | eBook |
Language: | English |
Published: |
Boca Raton, FL
CRC Press
2012
|
Subjects: | |
Online Access: | |
Collection: | O'Reilly - Collection details see MPG.ReNa |
Table of Contents:
- Ch. 1. Getting started
- ch. 2. Setting the stage
- ch. 3. The framework
- ch. 4. The business perspective
- ch. 5. Planning for a controlled attack
- ch. 6. Preparing for a hack
- ch. 7. Reconnaissance
- ch. 8. Enumeration
- ch. 9. Vulnerability analysis
- ch. 10. Exploitation
- ch. 11. The deliverable
- ch. 12. Integrating the results
- Includes bibliographical references and index