NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Penetration testing essentials. (Record no. 12398)

MARC details
000 -LEADER
fixed length control field 08856cam a2200913 a 4500
001 - CONTROL NUMBER
control field ocn964295404
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20240523125539.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu---unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 161125s2017 nju o 000 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency YDX
Language of cataloging eng
Description conventions pn
Transcribing agency YDX
Modifying agency N$T
-- EBLCP
-- OCLCQ
-- IDEBK
-- IDB
-- OCLCF
-- OCLCO
-- TEFOD
-- OCLCQ
-- UPM
-- OCLCA
-- MERUC
-- OCLCQ
-- LVT
-- CUY
-- ZCU
-- ICG
-- DKC
-- OCLCQ
-- N$T
-- IUL
-- UAB
-- K6U
-- DG1
-- OTZ
-- LIV
-- DEBSZ
-- D6H
-- VVB
-- RRP
-- CEF
-- COO
-- UKMGB
-- WYU
-- LOA
-- U3W
-- G3B
-- CNCEN
-- S8J
-- COCUF
-- CNNOR
-- VT2
-- UKAHL
-- GZM
-- NLW
-- OCLCQ
-- BRF
-- OCLCO
-- OCLCQ
-- OCL
-- EYM
-- OCLCO
-- OCLCQ
-- INARC
-- OCLCQ
-- OCLCO
-- OCLCL
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB702339
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 018111807
Source Uk
019 ## -
-- 963932448
-- 965146834
-- 967317070
-- 968630982
-- 971032383
-- 971068062
-- 971219141
-- 976195802
-- 1043774895
-- 1044550279
-- 1045166140
-- 1051132549
-- 1062316653
-- 1088964316
-- 1118665599
-- 1228583795
-- 1272921932
-- 1274605960
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119235330
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119235332
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119323983
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119323983
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119419358
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 1119419352
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9781119235309
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 1119235308
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000061349497
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier AU@
System control number 000062617075
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHBIS
System control number 011150730
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHNEW
System control number 000913223
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHNEW
System control number 000964854
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier CHVBK
System control number 495227196
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier DEBSZ
System control number 493821503
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier GBVCP
System control number 1000445844
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier GBVCP
System control number 1002862590
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC)
OCLC library identifier UKMGB
System control number 018111807
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)964295404
Canceled/invalid control number (OCoLC)963932448
-- (OCoLC)965146834
-- (OCoLC)967317070
-- (OCoLC)968630982
-- (OCoLC)971032383
-- (OCoLC)971068062
-- (OCoLC)971219141
-- (OCoLC)976195802
-- (OCoLC)1043774895
-- (OCoLC)1044550279
-- (OCoLC)1045166140
-- (OCoLC)1051132549
-- (OCoLC)1062316653
-- (OCoLC)1088964316
-- (OCoLC)1118665599
-- (OCoLC)1228583795
-- (OCoLC)1272921932
-- (OCoLC)1274605960
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number O75 2017eb
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Oriyano, Sean-Philip.
245 10 - TITLE STATEMENT
Title Penetration testing essentials.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Hoboken, NJ :
Name of producer, publisher, distributor, manufacturer Sybex,
Date of production, publication, distribution, manufacture, or copyright notice 2017.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from PDF title page (EBSCO, viewed July 1, 2019)
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Ch. 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Exploring Networking Concepts -- ch. 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5 Gathering Intelligence -- Introduction to Intelligence Gathering -- Examining a Company's Web Presence
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Finding Websites That Don't Exist Anymore -- Gathering Information with Search Engines -- Targeting Employees with People Searches -- Discovering Location -- Do Some Social Networking -- Looking via Financial Services -- Investigating Job Boards -- Searching Email -- Extracting Technical Information -- ch. 6 Scanning and Enumeration -- Introduction to Scanning -- Checking for Live Systems -- Performing Port Scanning -- Identifying an Operating System -- Scanning for Vulnerabilities -- Using Proxies (Or Keeping Your Head Down) -- Performing Enumeration -- ch. 7 Conducting Vulnerability Scanning -- Introduction to Vulnerability Scanning -- Recognizing the Limitations of Vulnerability Scanning -- Outlining the Vulnerability Scanning Process -- Types of Scans That Can Be Performed -- ch. 8 Cracking Passwords -- Recognizing Strong Passwords -- Choosing a Password-Cracking Technique -- Executing a Passive Online Attack -- Executing an Active Online Attack
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Executing an Offline Attack -- Using Nontechnical Methods -- Escalating Privileges -- ch. 9 Retaining Access with Backdoors and Malware -- Deciding How to Attack -- Installing a Backdoor with PsTools -- Opening a Shell with LAN Turtle -- Recognizing Types of Malware -- Launching Viruses -- Launching Worms -- Launching Spyware -- Inserting Trojans -- Installing Rootkits -- ch. 10 Reporting -- Reporting the Test Parameters -- Collecting Information -- Highlighting the Important Information -- Adding Supporting Documentation -- Conducting Quality Assurance -- ch. 11 Working with Defensive and Detection Systems -- Detecting Intrusions -- Recognizing the Signs of an Intrusion -- Evading an IDS -- Breaching a Firewall -- Using Honeypots: The Wolf in Sheep's Clothing -- ch. 12 Covering Your Tracks and Evading Detection -- Recognizing the Motivations for Evasion -- Getting Rid of Log Files -- Hiding Files -- Evading Antivirus Software
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Evading Defenses by Entering Through a Backdoor -- Using Rootkits for Evasion -- ch. 13 Detecting and Targeting Wireless -- An Introduction to Wireless -- Breaking Wireless Encryption Technologies -- Conducting a Wardriving Attack -- Conducting Other Types of Attack -- Choosing Tools to Attack Wireless -- Knocking Out Bluetooth -- Hacking the Internet of Things (IoT) -- ch. 14 Dealing with Mobile Device Security -- Recognizing Current-Generation Mobile Devices -- Working with Android OS -- Working with Apple iOS -- Finding Security Holes in Mobile Devices -- Encountering Bring Your Own Device (BYOD) -- Choosing Tools to Test Mobile Devices -- ch. 15 Performing Social Engineering -- Introduction to Social Engineering -- Exploiting Human Traits -- Acting Like a Social Engineer -- Targeting Specific Victims -- Leveraging Social Networking -- Conducting Safer Social Networking -- ch. 16 Hardening a Host System -- Introduction to Hardening
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Three Tenets of Defense -- Creating a Security Baseline -- Hardening with Group Policy -- Hardening Desktop Security -- Backing Up a System -- ch. 17 Hardening Your Network -- Introduction to Network Hardening -- Intrusion Detection Systems -- Firewalls -- Physical Security Controls -- ch. 18 Navigating the Path to Job Success -- Choosing Your Career Path -- Build a Library -- Practice Technical Writing -- Display Your Skills -- ch. 19 Building a Test Lab for Penetration Testing -- Deciding to Build a Lab -- Considering Virtualization -- Getting Starting and What You Will Need -- Installing Software.
520 ## - SUMMARY, ETC.
Summary, etc. IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. --
Assigning source Edited summary from book.
506 1# - RESTRICTIONS ON ACCESS NOTE
Terms governing access Legal Deposit;
Physical access provisions Only available on premises controlled by the deposit library and to one user at any one time;
Authorization The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
Institution to which field applies WlAbNL
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE
Terms governing use and reproduction Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
Institution to which field applies WlAbNL
590 ## - LOCAL NOTE (RLIN)
Local note John Wiley and Sons
Provenance (VM) [OBSOLETE] Wiley Online Library: Complete oBooks
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hackers.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hacking.
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer Security
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element S�ecurit�e informatique.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Pirates informatiques.
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Piratage informatique.
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hacking
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Prevention
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hackers
Source of heading or term fast
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Penetration testing (Computer security)
Source of heading or term fast
758 ## - RESOURCE IDENTIFIER
Relationship information has work:
Label Penetration testing essentials (Text)
Real World Object URI https://id.oclc.org/worldcat/entity/E39PCFy47q8j4YV6fT8hTHkygq
Relationship https://id.oclc.org/worldcat/ontology/hasWork
776 08 - ADDITIONAL PHYSICAL FORM ENTRY
Relationship information Print version:
International Standard Book Number 9781119323983
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419358</a>
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH30994290
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH32109554
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL4745627
938 ## -
-- EBSCOhost
-- EBSC
-- 1423169
938 ## -
-- Internet Archive
-- INAR
-- penetrationtesti0000oriy
938 ## -
-- YBP Library Services
-- YANK
-- 13270688
938 ## -
-- YBP Library Services
-- YANK
-- 14723961
938 ## -
-- YBP Library Services
-- YANK
-- 15101268
994 ## -
-- 92
-- INLUM

No items available.