|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Ric MessierPublisher: APress Imprint: APress Edition: 1st ed. Dimensions: Width: 15.50cm , Height: 0.70cm , Length: 23.50cm Weight: 2.117kg ISBN: 9781484218563ISBN 10: 1484218566 Pages: 115 Publication Date: 15 July 2016 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Manufactured on demand ![]() We will order this item for you from a manufactured on demand supplier. Table of Contents1. What Is Penetration Testing? Information Security Penetration Testing vs Security Assessments Who does Penetration Testing 2. Digging for Information Google Hacking Social Networking Job Sites Technical sources (e.g., regional Internet registries) 3. What’s Open? Port scanning Banner grabbing 4. Vulnerabilities Scanning for vulnerabilities Nessus vs Nexpose vs OpenVAS Fuzzing 5. Exploitation Using Metasploit Exploit Database 6. Breaking Web Sites Common Vulnerabilities< Web Scanning 7. ReportingReviewsThis volume is easy to read and quite pedagogical, which is maybe its greatest strength, together with putting together some examples and preparing the reader for them. Therefore, it is strongly recommended to chief information officers and IT operations and network operations directors, to ensure in-house information security processes are comprehensive enough. Next, it is also strongly recommended as a supplementary practice-oriented textbook for students in computer and information security, to guide them along in their perfection of this art. (L.-F. Pau, Computing Reviews, April, 2017) “This volume is easy to read and quite pedagogical, which is maybe its greatest strength, together with putting together some examples and preparing the reader for them. Therefore, it is strongly recommended to chief information officers and IT operations and network operations directors, to ensure in-house information security processes are comprehensive enough. Next, it is also strongly recommended as a supplementary practice-oriented textbook for students in computer and information security, to guide them along in their perfection of this art.” (L.-F. Pau, Computing Reviews, April, 2017) Author InformationRic Messier, MS, GCIH, GSEC, CEH, CISSP is the program director for Cyber Security, Computer Forensics and Digital Investigations and the Economic Crime Investigation bachelors' degree programs, as well as the Digital Forensic Science master's degree program at Champlain College. Messier has been involved in the networking and security arena since the early 1980s. He has worked at large Internet service providers and small software companies developing knowledge and experience about a range of topics related to networking and security. Messier has also been involved on incident response teams and has been consulted on forensic investigations for large companies. An established expert in the field and author, Messier has published several articles for Hackin9 Magazine, has developed number of video training titles with O'Reilly Media and has written a number of books on information security. Tab Content 6Author Website:Countries AvailableAll regions |