Penetration testing essentials.

Book Cover
Average Rating
Published
Hoboken, NJ : Sybex, 2017.
Status
Available Online

Description

Loading Description...

More Details

Format
Language
English
ISBN
9781119235330, 1119235332, 9781119323983, 1119323983, 9781119419358, 1119419352

Notes

Restrictions on Access
Legal Deposit;,Only available on premises controlled by the deposit library and to one user at any one time;,The Legal Deposit Libraries (Non-Print Works) Regulations (UK).,WlAbNL
Description
IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. --,Edited summary from book.
Terms Governing Use and Reproduction
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.,WlAbNL
Local note
O'Reilly,O'Reilly Online Learning: Academic/Public Library Edition

Also in this Series

Checking series information...

More Like This

Loading more titles like this title...

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Oriyano, S. (2017). Penetration testing essentials . Sybex.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Oriyano, Sean-Philip. 2017. Penetration Testing Essentials. Hoboken, NJ: Sybex.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Oriyano, Sean-Philip. Penetration Testing Essentials Hoboken, NJ: Sybex, 2017.

Harvard Citation (style guide)

Oriyano, S. (2017). Penetration testing essentials. Hoboken, NJ: Sybex.

MLA Citation, 9th Edition (style guide)

Oriyano, Sean-Philip. Penetration Testing Essentials Sybex, 2017.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
9ec6a25f-a75d-04ab-0add-b210cb7b7869-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work ID9ec6a25f-a75d-04ab-0add-b210cb7b7869-eng
Full titlepenetration testing essentials
Authororiyano sean philip
Grouping Categorybook
Last Update2024-10-08 10:55:34AM
Last Indexed2024-12-03 03:24:05AM

Book Cover Information

Image SourcecontentCafe
First LoadedAug 5, 2023
Last UsedNov 24, 2024

Marc Record

First DetectedMar 14, 2023 07:56:21 AM
Last File Modification TimeMar 14, 2023 07:56:21 AM
SuppressedRecord had no items

MARC Record

LEADER08136cam a2200685 a 4500
001ocn964295404
003OCoLC
00520230314075550.0
006m     o  d        
007cr cnu---unuuu
008161125s2017    nju     o     000 0 eng d
015 |a GBB702339|2 bnb
0167 |a 018111807|2 Uk
019 |a 963932448|a 965146834|a 967317070|a 968630982|a 971032383|a 971068062|a 971219141|a 976195802|a 1043774895|a 1044550279|a 1045166140|a 1051132549|a 1062316653|a 1088964316|a 1118665599|a 1228583795|a 1272921932|a 1274605960
020 |a 9781119235330|q (electronic bk.)
020 |a 1119235332|q (electronic bk.)
020 |a 9781119323983|q (electronic bk.)
020 |a 1119323983|q (electronic bk.)
020 |a 9781119419358|q (electronic bk.)
020 |a 1119419352|q (electronic bk.)
035 |a (OCoLC)964295404|z (OCoLC)963932448|z (OCoLC)965146834|z (OCoLC)967317070|z (OCoLC)968630982|z (OCoLC)971032383|z (OCoLC)971068062|z (OCoLC)971219141|z (OCoLC)976195802|z (OCoLC)1043774895|z (OCoLC)1044550279|z (OCoLC)1045166140|z (OCoLC)1051132549|z (OCoLC)1062316653|z (OCoLC)1088964316|z (OCoLC)1118665599|z (OCoLC)1228583795|z (OCoLC)1272921932|z (OCoLC)1274605960
037 |a 972894|b MIL
040 |a YDX|b eng|e pn|c YDX|d N$T|d EBLCP|d OCLCQ|d IDEBK|d IDB|d OCLCF|d OCLCO|d TEFOD|d OCLCQ|d UPM|d OCLCA|d MERUC|d OCLCQ|d LVT|d CUY|d ZCU|d ICG|d DKC|d OCLCQ|d N$T|d IUL|d UAB|d K6U|d DG1|d OTZ|d LIV|d DEBSZ|d D6H|d VVB|d RRP|d CEF|d COO|d UKMGB|d WYU|d LOA|d U3W|d G3B|d CNCEN|d S8J|d COCUF|d CNNOR|d VT2|d UKAHL|d GZM|d NLW|d OCLCQ|d BRF|d OCLCO|d OCLCQ|d OCL|d EYM|d OCLCO|d OCLCQ
049 |a MAIN
050 4|a QA76.9.A25|b O75 2017eb
08204|a 005.8|2 23
1001 |a Oriyano, Sean-Philip.|9 362059
24510|a Penetration testing essentials.
264 1|a Hoboken, NJ :|b Sybex,|c 2017.
300 |a 1 online resource
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
5050 |a Ch. 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Exploring Networking Concepts -- ch. 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5 Gathering Intelligence -- Introduction to Intelligence Gathering -- Examining a Company's Web Presence
5058 |a Finding Websites That Don't Exist Anymore -- Gathering Information with Search Engines -- Targeting Employees with People Searches -- Discovering Location -- Do Some Social Networking -- Looking via Financial Services -- Investigating Job Boards -- Searching Email -- Extracting Technical Information -- ch. 6 Scanning and Enumeration -- Introduction to Scanning -- Checking for Live Systems -- Performing Port Scanning -- Identifying an Operating System -- Scanning for Vulnerabilities -- Using Proxies (Or Keeping Your Head Down) -- Performing Enumeration -- ch. 7 Conducting Vulnerability Scanning -- Introduction to Vulnerability Scanning -- Recognizing the Limitations of Vulnerability Scanning -- Outlining the Vulnerability Scanning Process -- Types of Scans That Can Be Performed -- ch. 8 Cracking Passwords -- Recognizing Strong Passwords -- Choosing a Password-Cracking Technique -- Executing a Passive Online Attack -- Executing an Active Online Attack
5058 |a Executing an Offline Attack -- Using Nontechnical Methods -- Escalating Privileges -- ch. 9 Retaining Access with Backdoors and Malware -- Deciding How to Attack -- Installing a Backdoor with PsTools -- Opening a Shell with LAN Turtle -- Recognizing Types of Malware -- Launching Viruses -- Launching Worms -- Launching Spyware -- Inserting Trojans -- Installing Rootkits -- ch. 10 Reporting -- Reporting the Test Parameters -- Collecting Information -- Highlighting the Important Information -- Adding Supporting Documentation -- Conducting Quality Assurance -- ch. 11 Working with Defensive and Detection Systems -- Detecting Intrusions -- Recognizing the Signs of an Intrusion -- Evading an IDS -- Breaching a Firewall -- Using Honeypots: The Wolf in Sheep's Clothing -- ch. 12 Covering Your Tracks and Evading Detection -- Recognizing the Motivations for Evasion -- Getting Rid of Log Files -- Hiding Files -- Evading Antivirus Software
5058 |a Evading Defenses by Entering Through a Backdoor -- Using Rootkits for Evasion -- ch. 13 Detecting and Targeting Wireless -- An Introduction to Wireless -- Breaking Wireless Encryption Technologies -- Conducting a Wardriving Attack -- Conducting Other Types of Attack -- Choosing Tools to Attack Wireless -- Knocking Out Bluetooth -- Hacking the Internet of Things (IoT) -- ch. 14 Dealing with Mobile Device Security -- Recognizing Current-Generation Mobile Devices -- Working with Android OS -- Working with Apple iOS -- Finding Security Holes in Mobile Devices -- Encountering Bring Your Own Device (BYOD) -- Choosing Tools to Test Mobile Devices -- ch. 15 Performing Social Engineering -- Introduction to Social Engineering -- Exploiting Human Traits -- Acting Like a Social Engineer -- Targeting Specific Victims -- Leveraging Social Networking -- Conducting Safer Social Networking -- ch. 16 Hardening a Host System -- Introduction to Hardening
5058 |a Three Tenets of Defense -- Creating a Security Baseline -- Hardening with Group Policy -- Hardening Desktop Security -- Backing Up a System -- ch. 17 Hardening Your Network -- Introduction to Network Hardening -- Intrusion Detection Systems -- Firewalls -- Physical Security Controls -- ch. 18 Navigating the Path to Job Success -- Choosing Your Career Path -- Build a Library -- Practice Technical Writing -- Display Your Skills -- ch. 19 Building a Test Lab for Penetration Testing -- Deciding to Build a Lab -- Considering Virtualization -- Getting Starting and What You Will Need -- Installing Software.
5061 |a Legal Deposit;|c Only available on premises controlled by the deposit library and to one user at any one time;|e The Legal Deposit Libraries (Non-Print Works) Regulations (UK).|5 WlAbNL
520 |a IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. --|c Edited summary from book.
540 |a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.|5 WlAbNL
5880 |a Online resource; title from PDF title page (EBSCO, viewed July 1, 2019)
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
650 0|a Computer security.|9 65527
650 0|a Hackers.|9 69413
650 0|a Hacking.|9 404059
650 2|a Computer Security|9 65527
77608|i Print version:|z 9781119323983
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781119235309/?ar|x O'Reilly|z eBook
938 |a Askews and Holts Library Services|b ASKH|n AH30994290
938 |a Askews and Holts Library Services|b ASKH|n AH32109554
938 |a ProQuest Ebook Central|b EBLB|n EBL4745627
938 |a ProQuest Ebook Central|b EBLB|n EBL5086913
938 |a EBSCOhost|b EBSC|n 1423169
938 |a ProQuest MyiLibrary Digital eBook Collection|b IDEB|n cis37056388
938 |a YBP Library Services|b YANK|n 13270688
938 |a YBP Library Services|b YANK|n 14723961
938 |a YBP Library Services|b YANK|n 15101268
994 |a 92|b VIA
999 |c 281253|d 281253