The ethical hack a framework for business value penetration testing
There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical ha...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Boca Raton, FL :
Auerbach Publications
2005.
|
Edición: | 1st edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627171306719 |
Tabla de Contenidos:
- BOOK COVER; HALF-TITLE; TITLE; COPYRIGHT; ABOUT THE AUTHOR; CONTRIBUTORS; DEDICATION; TABLE OF CONTENTS; FOREWORD; PREFACE; ACKNOWLEDGEMENTS; 1 GETTING STARTED; 2 SETTING THE STAGE; 3 THE FRAMEWORK; 4 INFORMATION SECURITY MODELS; 5 INFORMATION SECURITY PROGRAM; 6 THE BUSINESS PERSPECTIVE; 7 PLANNING FOR A CONTROLLED ATTACK; 8 PREPARING FOR A HACK; 9 RECONNAISSANCE; 10 ENUMERATION; 11 VULNERABILITY ANALYSIS; 12 EXPLOITATION; 13 THE DELIVERABLE; 14 INTEGRATING THE RESULTS; INDEX.