From Hacking to Report Writing (häftad)
Fler böcker inom
Format
Häftad (Paperback / softback)
Språk
Engelska
Antal sidor
190
Utgivningsdatum
2016-11-05
Upplaga
1st ed.
Förlag
APress
Illustratör/Fotograf
Bibliographie
Illustrationer
53 Illustrations, color; 26 Illustrations, black and white; XXII, 190 p. 79 illus., 53 illus. in col
Dimensioner
254 x 178 x 12 mm
Vikt
381 g
Antal komponenter
1
Komponenter
1 Paperback / softback
ISBN
9781484222829

From Hacking to Report Writing

An Introduction to Security and Penetration Testing

Häftad,  Engelska, 2016-11-05
578
  • Skickas från oss inom 3-6 vardagar.
  • Fri frakt över 249 kr för privatkunder i Sverige.
Finns även som
Visa alla 1 format & utgåvor
Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally report security weaknesses using techniques such as SQL-injection, denial-of-service attacks, and password hacking. Although From Hacking to Report Writing will give you the technical know-how needed to carry out advanced security tests, it also offers insight into crafting professional looking reports describing your work and how your customers can benefit from it. The book will give you the tools you need to clearly communicate the benefits of high-quality security and penetration testing to IT-management, executives and other stakeholders. Embedded in the book are a number of on-the-job stories that will give you a good understandingof how you can apply what you have learned to real-world situations. We live in a time where computer security is more important than ever. Staying one step ahead of hackers has never been a bigger challenge. From Hacking to Report Writing clarifies how you can sleep better at night knowing that your network has been thoroughly tested. What youll learn Clearly understand why security and penetration testing is important Find vulnerabilities in any system using the same techniques as hackers do Write professional looking reports Know which security and penetration testing method to apply for any given situation Successfully hold together a security and penetration test project Who This Book Is For Aspiring security and penetration testers, security consultants, security and penetration testers, IT managers, andsecurity researchers.
Visa hela texten

Passar bra ihop

  1. From Hacking to Report Writing
  2. +
  3. Co-Intelligence

De som köpt den här boken har ofta också köpt Co-Intelligence av Ethan Mollick (häftad).

Köp båda 2 för 806 kr

Kundrecensioner

Har du läst boken? Sätt ditt betyg »

Fler böcker av Robert Svensson

Övrig information

Robert Svensson has had pretty much every IT job one can imagine: hes been yelled at over the phone taking support calls, hes done IT security incident management for multi-nationals, hes worked with startups, hes programmed and so on but over the last ten years or so IT security has been his sole focus. In his case, that means hes done countless penetration tests, written numerous reports and somehow managed to get rehired to do it all over again. And yeah, he fell in love with computers the second he unwrapped the commodore 64 he got for Christmas about a million years agoit all started there. One of Roberts goals in writing this book is to put out the book he wish he had read when he first started doing penetration testsa book that also clearly explains why security testing is important, not just how its done. However, the number one reason why hes writing this book is simple: passion. He loves security and learning as much about it as he possibly can. And havingworked as a teacher, he knows no better way to learn than to teach.

Innehållsförteckning

Chapter 1: Introduction.- Chapter 2: Security Testing Basics.- Chapter 3: The Security Testing Process.- Chapter 4: Technical Preparations.- Chapter 5: Security Test Execution.- Chapter 6: Identifying Vulnerabilities.- Chapter 7: Exploiting Vulnerabilities.- Chapter 8: Reporting Vulnerabilities.- Chapter 9: Example Reports.- Chapter 10: 10 Tips to Become a Better Security Tester.