|
![]() |
|||
|
||||
OverviewCISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of the testing life cycle. He describes how to set test expectations and how to identify a good test from a bad one. He introduces the business characteristics of testing, the imposed and inherent limitations, and describes how to deal with those limitations. The book outlines a framework for protecting confidential information and security professionals during testing. It covers social engineering and explains how to tune the plethora of options to best use this investigative tool within your own environment. Ideal for senior security management and anyone else responsible for ensuring a sound security posture, this reference depicts a wide range of possible attack scenarios. It illustrates the complete cycle of attack from the hacker's perspective and presents a comprehensive framework to help you meet the objectives of penetration testing--including deliverables and the final report. Full Product DetailsAuthor: James S. TillerPublisher: Taylor & Francis Inc Imprint: Taylor & Francis Inc Dimensions: Width: 15.60cm , Height: 3.00cm , Length: 23.40cm Weight: 0.830kg ISBN: 9781439880272ISBN 10: 1439880271 Pages: 392 Publication Date: 13 December 2011 Audience: Professional and scholarly , College/higher education , Professional & Vocational , Tertiary & Higher Education Format: Hardback Publisher's Status: Active Availability: Awaiting stock ![]() The supplier is currently out of stock of this item. It will be ordered for you and placed on backorder. Once it does come back in stock, we will ship it out for you. Table of ContentsHacking and Security. Hacking Impacts. Black and White. Information Security. The Hacker. The Security Consultant. Business Justification. The Business of Security. Expectations. Timing is Everything. Reasoning. Consultative Approach. Ethics. Logistics. Methodology. Reconnaissance. Vulnerability Assessment. Testing. Tools and Technology. Exposures. Top 25 Tools. Scenarios. Conclusion.ReviewsStaying in front of the bad guys and sometimes protecting yourself from the brain-dead acts in corporate environments are keys to successful security measures. Tiller teaches on the simplicity of security, breaking it down from smoke and mirrors to time-proven measures.! I have enjoyed reading Tiller's books in the past; his approach and ability to break down what is sometimes made to look like a complicated structure allows for not only a better understanding but a framework that is able to stand the test of time. -- Jeffrey Schmidt, Global Head Business Continuity, Security, and Governance, BT Global Services Author InformationJames S. Tiller is the Vice-President of Security Professional Services, North American BT Global Services. Tab Content 6Author Website:Countries AvailableAll regions |