|
|
|
|
LEADER |
06465nmm a2200601 u 4500 |
001 |
EB001997467 |
003 |
EBX01000000000000001160368 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210823 ||| eng |
020 |
|
|
|a 9781119323983
|
020 |
|
|
|a 9781119419358
|
020 |
|
|
|a 1119323983
|
020 |
|
|
|a 1119235332
|
020 |
|
|
|a 9781119235330
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Oriyano, Sean-Philip
|
245 |
0 |
0 |
|a Penetration testing essentials
|
260 |
|
|
|a Hoboken, NJ
|b Sybex
|c 2017
|
300 |
|
|
|a 1 online resource
|
505 |
0 |
|
|a Ch. 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Exploring Networking Concepts -- ch. 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5 Gathering Intelligence -- Introduction to Intelligence Gathering -- Examining a Company's Web Presence
|
505 |
0 |
|
|a Finding Websites That Don't Exist Anymore -- Gathering Information with Search Engines -- Targeting Employees with People Searches -- Discovering Location -- Do Some Social Networking -- Looking via Financial Services -- Investigating Job Boards -- Searching Email -- Extracting Technical Information -- ch. 6 Scanning and Enumeration -- Introduction to Scanning -- Checking for Live Systems -- Performing Port Scanning -- Identifying an Operating System -- Scanning for Vulnerabilities -- Using Proxies (Or Keeping Your Head Down) -- Performing Enumeration -- ch. 7 Conducting Vulnerability Scanning -- Introduction to Vulnerability Scanning -- Recognizing the Limitations of Vulnerability Scanning -- Outlining the Vulnerability Scanning Process -- Types of Scans That Can Be Performed -- ch. 8 Cracking Passwords -- Recognizing Strong Passwords -- Choosing a Password-Cracking Technique -- Executing a Passive Online Attack -- Executing an Active Online Attack
|
505 |
0 |
|
|a Three Tenets of Defense -- Creating a Security Baseline -- Hardening with Group Policy -- Hardening Desktop Security -- Backing Up a System -- ch. 17 Hardening Your Network -- Introduction to Network Hardening -- Intrusion Detection Systems -- Firewalls -- Physical Security Controls -- ch. 18 Navigating the Path to Job Success -- Choosing Your Career Path -- Build a Library -- Practice Technical Writing -- Display Your Skills -- ch. 19 Building a Test Lab for Penetration Testing -- Deciding to Build a Lab -- Considering Virtualization -- Getting Starting and What You Will Need -- Installing Software
|
505 |
0 |
|
|a Executing an Offline Attack -- Using Nontechnical Methods -- Escalating Privileges -- ch. 9 Retaining Access with Backdoors and Malware -- Deciding How to Attack -- Installing a Backdoor with PsTools -- Opening a Shell with LAN Turtle -- Recognizing Types of Malware -- Launching Viruses -- Launching Worms -- Launching Spyware -- Inserting Trojans -- Installing Rootkits -- ch. 10 Reporting -- Reporting the Test Parameters -- Collecting Information -- Highlighting the Important Information -- Adding Supporting Documentation -- Conducting Quality Assurance -- ch. 11 Working with Defensive and Detection Systems -- Detecting Intrusions -- Recognizing the Signs of an Intrusion -- Evading an IDS -- Breaching a Firewall -- Using Honeypots: The Wolf in Sheep's Clothing -- ch. 12 Covering Your Tracks and Evading Detection -- Recognizing the Motivations for Evasion -- Getting Rid of Log Files -- Hiding Files -- Evading Antivirus Software
|
505 |
0 |
|
|a Evading Defenses by Entering Through a Backdoor -- Using Rootkits for Evasion -- ch. 13 Detecting and Targeting Wireless -- An Introduction to Wireless -- Breaking Wireless Encryption Technologies -- Conducting a Wardriving Attack -- Conducting Other Types of Attack -- Choosing Tools to Attack Wireless -- Knocking Out Bluetooth -- Hacking the Internet of Things (IoT) -- ch. 14 Dealing with Mobile Device Security -- Recognizing Current-Generation Mobile Devices -- Working with Android OS -- Working with Apple iOS -- Finding Security Holes in Mobile Devices -- Encountering Bring Your Own Device (BYOD) -- Choosing Tools to Test Mobile Devices -- ch. 15 Performing Social Engineering -- Introduction to Social Engineering -- Exploiting Human Traits -- Acting Like a Social Engineer -- Targeting Specific Victims -- Leveraging Social Networking -- Conducting Safer Social Networking -- ch. 16 Hardening a Host System -- Introduction to Hardening
|
653 |
|
|
|a Hacking / http://id.loc.gov/authorities/subjects/sh2013002597
|
653 |
|
|
|a Hackers / http://id.loc.gov/authorities/subjects/sh94005931
|
653 |
|
|
|a Pirates informatiques
|
653 |
|
|
|a Hacking / fast
|
653 |
|
|
|a Piratage informatique
|
653 |
|
|
|a Penetration testing (Computer security) / fast
|
653 |
|
|
|a Computer crimes / Prevention / fast
|
653 |
|
|
|a Hackers / fast
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Computer Security
|
653 |
|
|
|a Computer security / fast
|
653 |
|
|
|a Computer security
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
500 |
|
|
|a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force
|
015 |
|
|
|a GBB702339
|
776 |
|
|
|z 9781119419358
|
776 |
|
|
|z 9781119235309
|
776 |
|
|
|z 9781119235330
|
776 |
|
|
|z 1119235332
|
776 |
|
|
|z 1119323983
|
776 |
|
|
|z 9781119323983
|
776 |
|
|
|z 1119235308
|
776 |
|
|
|z 1119419352
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781119235309/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 005.8
|
082 |
0 |
|
|a 364.1
|
520 |
|
|
|a IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. --
|