The ethical hack a framework for business value penetration testing

There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical ha...

Descripción completa

Detalles Bibliográficos
Autor principal: Tiller, James S. (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Boca Raton, FL : Auerbach Publications 2005.
Edición:1st edition
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627171306719
Tabla de Contenidos:
  • BOOK COVER; HALF-TITLE; TITLE; COPYRIGHT; ABOUT THE AUTHOR; CONTRIBUTORS; DEDICATION; TABLE OF CONTENTS; FOREWORD; PREFACE; ACKNOWLEDGEMENTS; 1 GETTING STARTED; 2 SETTING THE STAGE; 3 THE FRAMEWORK; 4 INFORMATION SECURITY MODELS; 5 INFORMATION SECURITY PROGRAM; 6 THE BUSINESS PERSPECTIVE; 7 PLANNING FOR A CONTROLLED ATTACK; 8 PREPARING FOR A HACK; 9 RECONNAISSANCE; 10 ENUMERATION; 11 VULNERABILITY ANALYSIS; 12 EXPLOITATION; 13 THE DELIVERABLE; 14 INTEGRATING THE RESULTS; INDEX.