000 08856cam a2200913 a 4500
001 ocn964295404
003 OCoLC
005 20240523125539.0
006 m o d
007 cr cnu---unuuu
008 161125s2017 nju o 000 0 eng d
040 _aYDX
_beng
_epn
_cYDX
_dN$T
_dEBLCP
_dOCLCQ
_dIDEBK
_dIDB
_dOCLCF
_dOCLCO
_dTEFOD
_dOCLCQ
_dUPM
_dOCLCA
_dMERUC
_dOCLCQ
_dLVT
_dCUY
_dZCU
_dICG
_dDKC
_dOCLCQ
_dN$T
_dIUL
_dUAB
_dK6U
_dDG1
_dOTZ
_dLIV
_dDEBSZ
_dD6H
_dVVB
_dRRP
_dCEF
_dCOO
_dUKMGB
_dWYU
_dLOA
_dU3W
_dG3B
_dCNCEN
_dS8J
_dCOCUF
_dCNNOR
_dVT2
_dUKAHL
_dGZM
_dNLW
_dOCLCQ
_dBRF
_dOCLCO
_dOCLCQ
_dOCL
_dEYM
_dOCLCO
_dOCLCQ
_dINARC
_dOCLCQ
_dOCLCO
_dOCLCL
015 _aGBB702339
_2bnb
016 7 _a018111807
_2Uk
019 _a963932448
_a965146834
_a967317070
_a968630982
_a971032383
_a971068062
_a971219141
_a976195802
_a1043774895
_a1044550279
_a1045166140
_a1051132549
_a1062316653
_a1088964316
_a1118665599
_a1228583795
_a1272921932
_a1274605960
020 _a9781119235330
_q(electronic bk.)
020 _a1119235332
_q(electronic bk.)
020 _a9781119323983
_q(electronic bk.)
020 _a1119323983
_q(electronic bk.)
020 _a9781119419358
_q(electronic bk.)
020 _a1119419352
_q(electronic bk.)
020 _z9781119235309
020 _z1119235308
029 1 _aAU@
_b000061349497
029 1 _aAU@
_b000062617075
029 1 _aCHBIS
_b011150730
029 1 _aCHNEW
_b000913223
029 1 _aCHNEW
_b000964854
029 1 _aCHVBK
_b495227196
029 1 _aDEBSZ
_b493821503
029 1 _aGBVCP
_b1000445844
029 1 _aGBVCP
_b1002862590
029 1 _aUKMGB
_b018111807
035 _a(OCoLC)964295404
_z(OCoLC)963932448
_z(OCoLC)965146834
_z(OCoLC)967317070
_z(OCoLC)968630982
_z(OCoLC)971032383
_z(OCoLC)971068062
_z(OCoLC)971219141
_z(OCoLC)976195802
_z(OCoLC)1043774895
_z(OCoLC)1044550279
_z(OCoLC)1045166140
_z(OCoLC)1051132549
_z(OCoLC)1062316653
_z(OCoLC)1088964316
_z(OCoLC)1118665599
_z(OCoLC)1228583795
_z(OCoLC)1272921932
_z(OCoLC)1274605960
050 4 _aQA76.9.A25
_bO75 2017eb
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aOriyano, Sean-Philip.
245 1 0 _aPenetration testing essentials.
264 1 _aHoboken, NJ :
_bSybex,
_c2017.
300 _a1 online resource
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
588 0 _aOnline resource; title from PDF title page (EBSCO, viewed July 1, 2019)
505 0 _aCh. 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Exploring Networking Concepts -- ch. 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5 Gathering Intelligence -- Introduction to Intelligence Gathering -- Examining a Company's Web Presence
505 8 _aFinding Websites That Don't Exist Anymore -- Gathering Information with Search Engines -- Targeting Employees with People Searches -- Discovering Location -- Do Some Social Networking -- Looking via Financial Services -- Investigating Job Boards -- Searching Email -- Extracting Technical Information -- ch. 6 Scanning and Enumeration -- Introduction to Scanning -- Checking for Live Systems -- Performing Port Scanning -- Identifying an Operating System -- Scanning for Vulnerabilities -- Using Proxies (Or Keeping Your Head Down) -- Performing Enumeration -- ch. 7 Conducting Vulnerability Scanning -- Introduction to Vulnerability Scanning -- Recognizing the Limitations of Vulnerability Scanning -- Outlining the Vulnerability Scanning Process -- Types of Scans That Can Be Performed -- ch. 8 Cracking Passwords -- Recognizing Strong Passwords -- Choosing a Password-Cracking Technique -- Executing a Passive Online Attack -- Executing an Active Online Attack
505 8 _aExecuting an Offline Attack -- Using Nontechnical Methods -- Escalating Privileges -- ch. 9 Retaining Access with Backdoors and Malware -- Deciding How to Attack -- Installing a Backdoor with PsTools -- Opening a Shell with LAN Turtle -- Recognizing Types of Malware -- Launching Viruses -- Launching Worms -- Launching Spyware -- Inserting Trojans -- Installing Rootkits -- ch. 10 Reporting -- Reporting the Test Parameters -- Collecting Information -- Highlighting the Important Information -- Adding Supporting Documentation -- Conducting Quality Assurance -- ch. 11 Working with Defensive and Detection Systems -- Detecting Intrusions -- Recognizing the Signs of an Intrusion -- Evading an IDS -- Breaching a Firewall -- Using Honeypots: The Wolf in Sheep's Clothing -- ch. 12 Covering Your Tracks and Evading Detection -- Recognizing the Motivations for Evasion -- Getting Rid of Log Files -- Hiding Files -- Evading Antivirus Software
505 8 _aEvading Defenses by Entering Through a Backdoor -- Using Rootkits for Evasion -- ch. 13 Detecting and Targeting Wireless -- An Introduction to Wireless -- Breaking Wireless Encryption Technologies -- Conducting a Wardriving Attack -- Conducting Other Types of Attack -- Choosing Tools to Attack Wireless -- Knocking Out Bluetooth -- Hacking the Internet of Things (IoT) -- ch. 14 Dealing with Mobile Device Security -- Recognizing Current-Generation Mobile Devices -- Working with Android OS -- Working with Apple iOS -- Finding Security Holes in Mobile Devices -- Encountering Bring Your Own Device (BYOD) -- Choosing Tools to Test Mobile Devices -- ch. 15 Performing Social Engineering -- Introduction to Social Engineering -- Exploiting Human Traits -- Acting Like a Social Engineer -- Targeting Specific Victims -- Leveraging Social Networking -- Conducting Safer Social Networking -- ch. 16 Hardening a Host System -- Introduction to Hardening
505 8 _aThree Tenets of Defense -- Creating a Security Baseline -- Hardening with Group Policy -- Hardening Desktop Security -- Backing Up a System -- ch. 17 Hardening Your Network -- Introduction to Network Hardening -- Intrusion Detection Systems -- Firewalls -- Physical Security Controls -- ch. 18 Navigating the Path to Job Success -- Choosing Your Career Path -- Build a Library -- Practice Technical Writing -- Display Your Skills -- ch. 19 Building a Test Lab for Penetration Testing -- Deciding to Build a Lab -- Considering Virtualization -- Getting Starting and What You Will Need -- Installing Software.
520 _aIT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. --
_cEdited summary from book.
506 1 _aLegal Deposit;
_cOnly available on premises controlled by the deposit library and to one user at any one time;
_eThe Legal Deposit Libraries (Non-Print Works) Regulations (UK).
_5WlAbNL
540 _aRestricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
_5WlAbNL
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aComputer security.
650 0 _aHackers.
650 0 _aHacking.
650 2 _aComputer Security
650 6 _aS�ecurit�e informatique.
650 6 _aPirates informatiques.
650 6 _aPiratage informatique.
650 7 _aHacking
_2fast
650 7 _aComputer security
_2fast
650 7 _aComputer crimes
_xPrevention
_2fast
650 7 _aHackers
_2fast
650 7 _aPenetration testing (Computer security)
_2fast
758 _ihas work:
_aPenetration testing essentials (Text)
_1https://id.oclc.org/worldcat/entity/E39PCFy47q8j4YV6fT8hTHkygq
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_z9781119323983
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119419358
938 _aAskews and Holts Library Services
_bASKH
_nAH30994290
938 _aAskews and Holts Library Services
_bASKH
_nAH32109554
938 _aProQuest Ebook Central
_bEBLB
_nEBL4745627
938 _aEBSCOhost
_bEBSC
_n1423169
938 _aInternet Archive
_bINAR
_npenetrationtesti0000oriy
938 _aYBP Library Services
_bYANK
_n13270688
938 _aYBP Library Services
_bYANK
_n14723961
938 _aYBP Library Services
_bYANK
_n15101268
994 _a92
_bINLUM
999 _c12398
_d12398