Penetration testing essentials. (Record no. 12398)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 08856cam a2200913 a 4500 |
001 - CONTROL NUMBER | |
control field | ocn964295404 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240523125539.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu---unuuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 161125s2017 nju o 000 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | YDX |
Language of cataloging | eng |
Description conventions | pn |
Transcribing agency | YDX |
Modifying agency | N$T |
-- | EBLCP |
-- | OCLCQ |
-- | IDEBK |
-- | IDB |
-- | OCLCF |
-- | OCLCO |
-- | TEFOD |
-- | OCLCQ |
-- | UPM |
-- | OCLCA |
-- | MERUC |
-- | OCLCQ |
-- | LVT |
-- | CUY |
-- | ZCU |
-- | ICG |
-- | DKC |
-- | OCLCQ |
-- | N$T |
-- | IUL |
-- | UAB |
-- | K6U |
-- | DG1 |
-- | OTZ |
-- | LIV |
-- | DEBSZ |
-- | D6H |
-- | VVB |
-- | RRP |
-- | CEF |
-- | COO |
-- | UKMGB |
-- | WYU |
-- | LOA |
-- | U3W |
-- | G3B |
-- | CNCEN |
-- | S8J |
-- | COCUF |
-- | CNNOR |
-- | VT2 |
-- | UKAHL |
-- | GZM |
-- | NLW |
-- | OCLCQ |
-- | BRF |
-- | OCLCO |
-- | OCLCQ |
-- | OCL |
-- | EYM |
-- | OCLCO |
-- | OCLCQ |
-- | INARC |
-- | OCLCQ |
-- | OCLCO |
-- | OCLCL |
015 ## - NATIONAL BIBLIOGRAPHY NUMBER | |
National bibliography number | GBB702339 |
Source | bnb |
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER | |
Record control number | 018111807 |
Source | Uk |
019 ## - | |
-- | 963932448 |
-- | 965146834 |
-- | 967317070 |
-- | 968630982 |
-- | 971032383 |
-- | 971068062 |
-- | 971219141 |
-- | 976195802 |
-- | 1043774895 |
-- | 1044550279 |
-- | 1045166140 |
-- | 1051132549 |
-- | 1062316653 |
-- | 1088964316 |
-- | 1118665599 |
-- | 1228583795 |
-- | 1272921932 |
-- | 1274605960 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119235330 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119235332 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119323983 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119323983 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119419358 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119419352 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781119235309 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 1119235308 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000061349497 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000062617075 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHBIS |
System control number | 011150730 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHNEW |
System control number | 000913223 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHNEW |
System control number | 000964854 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHVBK |
System control number | 495227196 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | DEBSZ |
System control number | 493821503 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | GBVCP |
System control number | 1000445844 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | GBVCP |
System control number | 1002862590 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | UKMGB |
System control number | 018111807 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)964295404 |
Canceled/invalid control number | (OCoLC)963932448 |
-- | (OCoLC)965146834 |
-- | (OCoLC)967317070 |
-- | (OCoLC)968630982 |
-- | (OCoLC)971032383 |
-- | (OCoLC)971068062 |
-- | (OCoLC)971219141 |
-- | (OCoLC)976195802 |
-- | (OCoLC)1043774895 |
-- | (OCoLC)1044550279 |
-- | (OCoLC)1045166140 |
-- | (OCoLC)1051132549 |
-- | (OCoLC)1062316653 |
-- | (OCoLC)1088964316 |
-- | (OCoLC)1118665599 |
-- | (OCoLC)1228583795 |
-- | (OCoLC)1272921932 |
-- | (OCoLC)1274605960 |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
Item number | O75 2017eb |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Oriyano, Sean-Philip. |
245 10 - TITLE STATEMENT | |
Title | Penetration testing essentials. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Hoboken, NJ : |
Name of producer, publisher, distributor, manufacturer | Sybex, |
Date of production, publication, distribution, manufacture, or copyright notice | 2017. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Online resource; title from PDF title page (EBSCO, viewed July 1, 2019) |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Ch. 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Exploring Networking Concepts -- ch. 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5 Gathering Intelligence -- Introduction to Intelligence Gathering -- Examining a Company's Web Presence |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Finding Websites That Don't Exist Anymore -- Gathering Information with Search Engines -- Targeting Employees with People Searches -- Discovering Location -- Do Some Social Networking -- Looking via Financial Services -- Investigating Job Boards -- Searching Email -- Extracting Technical Information -- ch. 6 Scanning and Enumeration -- Introduction to Scanning -- Checking for Live Systems -- Performing Port Scanning -- Identifying an Operating System -- Scanning for Vulnerabilities -- Using Proxies (Or Keeping Your Head Down) -- Performing Enumeration -- ch. 7 Conducting Vulnerability Scanning -- Introduction to Vulnerability Scanning -- Recognizing the Limitations of Vulnerability Scanning -- Outlining the Vulnerability Scanning Process -- Types of Scans That Can Be Performed -- ch. 8 Cracking Passwords -- Recognizing Strong Passwords -- Choosing a Password-Cracking Technique -- Executing a Passive Online Attack -- Executing an Active Online Attack |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Executing an Offline Attack -- Using Nontechnical Methods -- Escalating Privileges -- ch. 9 Retaining Access with Backdoors and Malware -- Deciding How to Attack -- Installing a Backdoor with PsTools -- Opening a Shell with LAN Turtle -- Recognizing Types of Malware -- Launching Viruses -- Launching Worms -- Launching Spyware -- Inserting Trojans -- Installing Rootkits -- ch. 10 Reporting -- Reporting the Test Parameters -- Collecting Information -- Highlighting the Important Information -- Adding Supporting Documentation -- Conducting Quality Assurance -- ch. 11 Working with Defensive and Detection Systems -- Detecting Intrusions -- Recognizing the Signs of an Intrusion -- Evading an IDS -- Breaching a Firewall -- Using Honeypots: The Wolf in Sheep's Clothing -- ch. 12 Covering Your Tracks and Evading Detection -- Recognizing the Motivations for Evasion -- Getting Rid of Log Files -- Hiding Files -- Evading Antivirus Software |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Evading Defenses by Entering Through a Backdoor -- Using Rootkits for Evasion -- ch. 13 Detecting and Targeting Wireless -- An Introduction to Wireless -- Breaking Wireless Encryption Technologies -- Conducting a Wardriving Attack -- Conducting Other Types of Attack -- Choosing Tools to Attack Wireless -- Knocking Out Bluetooth -- Hacking the Internet of Things (IoT) -- ch. 14 Dealing with Mobile Device Security -- Recognizing Current-Generation Mobile Devices -- Working with Android OS -- Working with Apple iOS -- Finding Security Holes in Mobile Devices -- Encountering Bring Your Own Device (BYOD) -- Choosing Tools to Test Mobile Devices -- ch. 15 Performing Social Engineering -- Introduction to Social Engineering -- Exploiting Human Traits -- Acting Like a Social Engineer -- Targeting Specific Victims -- Leveraging Social Networking -- Conducting Safer Social Networking -- ch. 16 Hardening a Host System -- Introduction to Hardening |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Three Tenets of Defense -- Creating a Security Baseline -- Hardening with Group Policy -- Hardening Desktop Security -- Backing Up a System -- ch. 17 Hardening Your Network -- Introduction to Network Hardening -- Intrusion Detection Systems -- Firewalls -- Physical Security Controls -- ch. 18 Navigating the Path to Job Success -- Choosing Your Career Path -- Build a Library -- Practice Technical Writing -- Display Your Skills -- ch. 19 Building a Test Lab for Penetration Testing -- Deciding to Build a Lab -- Considering Virtualization -- Getting Starting and What You Will Need -- Installing Software. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. -- |
Assigning source | Edited summary from book. |
506 1# - RESTRICTIONS ON ACCESS NOTE | |
Terms governing access | Legal Deposit; |
Physical access provisions | Only available on premises controlled by the deposit library and to one user at any one time; |
Authorization | The Legal Deposit Libraries (Non-Print Works) Regulations (UK). |
Institution to which field applies | WlAbNL |
540 ## - TERMS GOVERNING USE AND REPRODUCTION NOTE | |
Terms governing use and reproduction | Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force. |
Institution to which field applies | WlAbNL |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
Provenance (VM) [OBSOLETE] | Wiley Online Library: Complete oBooks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Hackers. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Hacking. |
650 #2 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer Security |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | S�ecurit�e informatique. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Pirates informatiques. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Piratage informatique. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Hacking |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer crimes |
General subdivision | Prevention |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Hackers |
Source of heading or term | fast |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Penetration testing (Computer security) |
Source of heading or term | fast |
758 ## - RESOURCE IDENTIFIER | |
Relationship information | has work: |
Label | Penetration testing essentials (Text) |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCFy47q8j4YV6fT8hTHkygq |
Relationship | https://id.oclc.org/worldcat/ontology/hasWork |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
International Standard Book Number | 9781119323983 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419358">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119419358</a> |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH30994290 |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH32109554 |
938 ## - | |
-- | ProQuest Ebook Central |
-- | EBLB |
-- | EBL4745627 |
938 ## - | |
-- | EBSCOhost |
-- | EBSC |
-- | 1423169 |
938 ## - | |
-- | Internet Archive |
-- | INAR |
-- | penetrationtesti0000oriy |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 13270688 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 14723961 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 15101268 |
994 ## - | |
-- | 92 |
-- | INLUM |
No items available.