000 | 08856cam a2200913 a 4500 | ||
---|---|---|---|
001 | ocn964295404 | ||
003 | OCoLC | ||
005 | 20240523125539.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 161125s2017 nju o 000 0 eng d | ||
040 |
_aYDX _beng _epn _cYDX _dN$T _dEBLCP _dOCLCQ _dIDEBK _dIDB _dOCLCF _dOCLCO _dTEFOD _dOCLCQ _dUPM _dOCLCA _dMERUC _dOCLCQ _dLVT _dCUY _dZCU _dICG _dDKC _dOCLCQ _dN$T _dIUL _dUAB _dK6U _dDG1 _dOTZ _dLIV _dDEBSZ _dD6H _dVVB _dRRP _dCEF _dCOO _dUKMGB _dWYU _dLOA _dU3W _dG3B _dCNCEN _dS8J _dCOCUF _dCNNOR _dVT2 _dUKAHL _dGZM _dNLW _dOCLCQ _dBRF _dOCLCO _dOCLCQ _dOCL _dEYM _dOCLCO _dOCLCQ _dINARC _dOCLCQ _dOCLCO _dOCLCL |
||
015 |
_aGBB702339 _2bnb |
||
016 | 7 |
_a018111807 _2Uk |
|
019 |
_a963932448 _a965146834 _a967317070 _a968630982 _a971032383 _a971068062 _a971219141 _a976195802 _a1043774895 _a1044550279 _a1045166140 _a1051132549 _a1062316653 _a1088964316 _a1118665599 _a1228583795 _a1272921932 _a1274605960 |
||
020 |
_a9781119235330 _q(electronic bk.) |
||
020 |
_a1119235332 _q(electronic bk.) |
||
020 |
_a9781119323983 _q(electronic bk.) |
||
020 |
_a1119323983 _q(electronic bk.) |
||
020 |
_a9781119419358 _q(electronic bk.) |
||
020 |
_a1119419352 _q(electronic bk.) |
||
020 | _z9781119235309 | ||
020 | _z1119235308 | ||
029 | 1 |
_aAU@ _b000061349497 |
|
029 | 1 |
_aAU@ _b000062617075 |
|
029 | 1 |
_aCHBIS _b011150730 |
|
029 | 1 |
_aCHNEW _b000913223 |
|
029 | 1 |
_aCHNEW _b000964854 |
|
029 | 1 |
_aCHVBK _b495227196 |
|
029 | 1 |
_aDEBSZ _b493821503 |
|
029 | 1 |
_aGBVCP _b1000445844 |
|
029 | 1 |
_aGBVCP _b1002862590 |
|
029 | 1 |
_aUKMGB _b018111807 |
|
035 |
_a(OCoLC)964295404 _z(OCoLC)963932448 _z(OCoLC)965146834 _z(OCoLC)967317070 _z(OCoLC)968630982 _z(OCoLC)971032383 _z(OCoLC)971068062 _z(OCoLC)971219141 _z(OCoLC)976195802 _z(OCoLC)1043774895 _z(OCoLC)1044550279 _z(OCoLC)1045166140 _z(OCoLC)1051132549 _z(OCoLC)1062316653 _z(OCoLC)1088964316 _z(OCoLC)1118665599 _z(OCoLC)1228583795 _z(OCoLC)1272921932 _z(OCoLC)1274605960 |
||
050 | 4 |
_aQA76.9.A25 _bO75 2017eb |
|
082 | 0 | 4 |
_a005.8 _223 |
049 | _aMAIN | ||
100 | 1 | _aOriyano, Sean-Philip. | |
245 | 1 | 0 | _aPenetration testing essentials. |
264 | 1 |
_aHoboken, NJ : _bSybex, _c2017. |
|
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
588 | 0 | _aOnline resource; title from PDF title page (EBSCO, viewed July 1, 2019) | |
505 | 0 | _aCh. 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Exploring Networking Concepts -- ch. 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5 Gathering Intelligence -- Introduction to Intelligence Gathering -- Examining a Company's Web Presence | |
505 | 8 | _aFinding Websites That Don't Exist Anymore -- Gathering Information with Search Engines -- Targeting Employees with People Searches -- Discovering Location -- Do Some Social Networking -- Looking via Financial Services -- Investigating Job Boards -- Searching Email -- Extracting Technical Information -- ch. 6 Scanning and Enumeration -- Introduction to Scanning -- Checking for Live Systems -- Performing Port Scanning -- Identifying an Operating System -- Scanning for Vulnerabilities -- Using Proxies (Or Keeping Your Head Down) -- Performing Enumeration -- ch. 7 Conducting Vulnerability Scanning -- Introduction to Vulnerability Scanning -- Recognizing the Limitations of Vulnerability Scanning -- Outlining the Vulnerability Scanning Process -- Types of Scans That Can Be Performed -- ch. 8 Cracking Passwords -- Recognizing Strong Passwords -- Choosing a Password-Cracking Technique -- Executing a Passive Online Attack -- Executing an Active Online Attack | |
505 | 8 | _aExecuting an Offline Attack -- Using Nontechnical Methods -- Escalating Privileges -- ch. 9 Retaining Access with Backdoors and Malware -- Deciding How to Attack -- Installing a Backdoor with PsTools -- Opening a Shell with LAN Turtle -- Recognizing Types of Malware -- Launching Viruses -- Launching Worms -- Launching Spyware -- Inserting Trojans -- Installing Rootkits -- ch. 10 Reporting -- Reporting the Test Parameters -- Collecting Information -- Highlighting the Important Information -- Adding Supporting Documentation -- Conducting Quality Assurance -- ch. 11 Working with Defensive and Detection Systems -- Detecting Intrusions -- Recognizing the Signs of an Intrusion -- Evading an IDS -- Breaching a Firewall -- Using Honeypots: The Wolf in Sheep's Clothing -- ch. 12 Covering Your Tracks and Evading Detection -- Recognizing the Motivations for Evasion -- Getting Rid of Log Files -- Hiding Files -- Evading Antivirus Software | |
505 | 8 | _aEvading Defenses by Entering Through a Backdoor -- Using Rootkits for Evasion -- ch. 13 Detecting and Targeting Wireless -- An Introduction to Wireless -- Breaking Wireless Encryption Technologies -- Conducting a Wardriving Attack -- Conducting Other Types of Attack -- Choosing Tools to Attack Wireless -- Knocking Out Bluetooth -- Hacking the Internet of Things (IoT) -- ch. 14 Dealing with Mobile Device Security -- Recognizing Current-Generation Mobile Devices -- Working with Android OS -- Working with Apple iOS -- Finding Security Holes in Mobile Devices -- Encountering Bring Your Own Device (BYOD) -- Choosing Tools to Test Mobile Devices -- ch. 15 Performing Social Engineering -- Introduction to Social Engineering -- Exploiting Human Traits -- Acting Like a Social Engineer -- Targeting Specific Victims -- Leveraging Social Networking -- Conducting Safer Social Networking -- ch. 16 Hardening a Host System -- Introduction to Hardening | |
505 | 8 | _aThree Tenets of Defense -- Creating a Security Baseline -- Hardening with Group Policy -- Hardening Desktop Security -- Backing Up a System -- ch. 17 Hardening Your Network -- Introduction to Network Hardening -- Intrusion Detection Systems -- Firewalls -- Physical Security Controls -- ch. 18 Navigating the Path to Job Success -- Choosing Your Career Path -- Build a Library -- Practice Technical Writing -- Display Your Skills -- ch. 19 Building a Test Lab for Penetration Testing -- Deciding to Build a Lab -- Considering Virtualization -- Getting Starting and What You Will Need -- Installing Software. | |
520 |
_aIT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. -- _cEdited summary from book. |
||
506 | 1 |
_aLegal Deposit; _cOnly available on premises controlled by the deposit library and to one user at any one time; _eThe Legal Deposit Libraries (Non-Print Works) Regulations (UK). _5WlAbNL |
|
540 |
_aRestricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force. _5WlAbNL |
||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 | _aComputer security. | |
650 | 0 | _aHackers. | |
650 | 0 | _aHacking. | |
650 | 2 | _aComputer Security | |
650 | 6 | _aS�ecurit�e informatique. | |
650 | 6 | _aPirates informatiques. | |
650 | 6 | _aPiratage informatique. | |
650 | 7 |
_aHacking _2fast |
|
650 | 7 |
_aComputer security _2fast |
|
650 | 7 |
_aComputer crimes _xPrevention _2fast |
|
650 | 7 |
_aHackers _2fast |
|
650 | 7 |
_aPenetration testing (Computer security) _2fast |
|
758 |
_ihas work: _aPenetration testing essentials (Text) _1https://id.oclc.org/worldcat/entity/E39PCFy47q8j4YV6fT8hTHkygq _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _z9781119323983 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119419358 |
938 |
_aAskews and Holts Library Services _bASKH _nAH30994290 |
||
938 |
_aAskews and Holts Library Services _bASKH _nAH32109554 |
||
938 |
_aProQuest Ebook Central _bEBLB _nEBL4745627 |
||
938 |
_aEBSCOhost _bEBSC _n1423169 |
||
938 |
_aInternet Archive _bINAR _npenetrationtesti0000oriy |
||
938 |
_aYBP Library Services _bYANK _n13270688 |
||
938 |
_aYBP Library Services _bYANK _n14723961 |
||
938 |
_aYBP Library Services _bYANK _n15101268 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12398 _d12398 |