Penetration testing essentials.
Description
Loading Description...
More Details
Format
Language
English
ISBN
9781119235330, 1119235332, 9781119323983, 1119323983, 9781119419358, 1119419352
Notes
Restrictions on Access
Legal Deposit;,Only available on premises controlled by the deposit library and to one user at any one time;,The Legal Deposit Libraries (Non-Print Works) Regulations (UK).,WlAbNL
Description
IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. --,Edited summary from book.
Terms Governing Use and Reproduction
Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.,WlAbNL
Local note
O'Reilly,O'Reilly Online Learning: Academic/Public Library Edition
Subjects
LC Subjects
Other Subjects
Also in this Series
Checking series information...
Reviews from GoodReads
Loading GoodReads Reviews.
Citations
APA Citation, 7th Edition (style guide)
Oriyano, S. (2017). Penetration testing essentials . Sybex.
Chicago / Turabian - Author Date Citation, 17th Edition (style guide)Oriyano, Sean-Philip. 2017. Penetration Testing Essentials. Hoboken, NJ: Sybex.
Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)Oriyano, Sean-Philip. Penetration Testing Essentials Hoboken, NJ: Sybex, 2017.
Harvard Citation (style guide)Oriyano, S. (2017). Penetration testing essentials. Hoboken, NJ: Sybex.
MLA Citation, 9th Edition (style guide)Oriyano, Sean-Philip. Penetration Testing Essentials Sybex, 2017.
Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.
Staff View
Grouped Work ID
9ec6a25f-a75d-04ab-0add-b210cb7b7869-eng
Grouping Information
Grouped Work ID | 9ec6a25f-a75d-04ab-0add-b210cb7b7869-eng |
---|---|
Full title | penetration testing essentials |
Author | oriyano sean philip |
Grouping Category | book |
Last Update | 2024-10-08 10:55:34AM |
Last Indexed | 2024-12-03 03:24:05AM |
Book Cover Information
Image Source | contentCafe |
---|---|
First Loaded | Aug 5, 2023 |
Last Used | Nov 24, 2024 |
Marc Record
First Detected | Mar 14, 2023 07:56:21 AM |
---|---|
Last File Modification Time | Mar 14, 2023 07:56:21 AM |
Suppressed | Record had no items |
MARC Record
LEADER | 08136cam a2200685 a 4500 | ||
---|---|---|---|
001 | ocn964295404 | ||
003 | OCoLC | ||
005 | 20230314075550.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 161125s2017 nju o 000 0 eng d | ||
015 | |a GBB702339|2 bnb | ||
016 | 7 | |a 018111807|2 Uk | |
019 | |a 963932448|a 965146834|a 967317070|a 968630982|a 971032383|a 971068062|a 971219141|a 976195802|a 1043774895|a 1044550279|a 1045166140|a 1051132549|a 1062316653|a 1088964316|a 1118665599|a 1228583795|a 1272921932|a 1274605960 | ||
020 | |a 9781119235330|q (electronic bk.) | ||
020 | |a 1119235332|q (electronic bk.) | ||
020 | |a 9781119323983|q (electronic bk.) | ||
020 | |a 1119323983|q (electronic bk.) | ||
020 | |a 9781119419358|q (electronic bk.) | ||
020 | |a 1119419352|q (electronic bk.) | ||
035 | |a (OCoLC)964295404|z (OCoLC)963932448|z (OCoLC)965146834|z (OCoLC)967317070|z (OCoLC)968630982|z (OCoLC)971032383|z (OCoLC)971068062|z (OCoLC)971219141|z (OCoLC)976195802|z (OCoLC)1043774895|z (OCoLC)1044550279|z (OCoLC)1045166140|z (OCoLC)1051132549|z (OCoLC)1062316653|z (OCoLC)1088964316|z (OCoLC)1118665599|z (OCoLC)1228583795|z (OCoLC)1272921932|z (OCoLC)1274605960 | ||
037 | |a 972894|b MIL | ||
040 | |a YDX|b eng|e pn|c YDX|d N$T|d EBLCP|d OCLCQ|d IDEBK|d IDB|d OCLCF|d OCLCO|d TEFOD|d OCLCQ|d UPM|d OCLCA|d MERUC|d OCLCQ|d LVT|d CUY|d ZCU|d ICG|d DKC|d OCLCQ|d N$T|d IUL|d UAB|d K6U|d DG1|d OTZ|d LIV|d DEBSZ|d D6H|d VVB|d RRP|d CEF|d COO|d UKMGB|d WYU|d LOA|d U3W|d G3B|d CNCEN|d S8J|d COCUF|d CNNOR|d VT2|d UKAHL|d GZM|d NLW|d OCLCQ|d BRF|d OCLCO|d OCLCQ|d OCL|d EYM|d OCLCO|d OCLCQ | ||
049 | |a MAIN | ||
050 | 4 | |a QA76.9.A25|b O75 2017eb | |
082 | 0 | 4 | |a 005.8|2 23 |
100 | 1 | |a Oriyano, Sean-Philip.|9 362059 | |
245 | 1 | 0 | |a Penetration testing essentials. |
264 | 1 | |a Hoboken, NJ :|b Sybex,|c 2017. | |
300 | |a 1 online resource | ||
336 | |a text|b txt|2 rdacontent | ||
337 | |a computer|b c|2 rdamedia | ||
338 | |a online resource|b cr|2 rdacarrier | ||
505 | 0 | |a Ch. 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Exploring Networking Concepts -- ch. 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5 Gathering Intelligence -- Introduction to Intelligence Gathering -- Examining a Company's Web Presence | |
505 | 8 | |a Finding Websites That Don't Exist Anymore -- Gathering Information with Search Engines -- Targeting Employees with People Searches -- Discovering Location -- Do Some Social Networking -- Looking via Financial Services -- Investigating Job Boards -- Searching Email -- Extracting Technical Information -- ch. 6 Scanning and Enumeration -- Introduction to Scanning -- Checking for Live Systems -- Performing Port Scanning -- Identifying an Operating System -- Scanning for Vulnerabilities -- Using Proxies (Or Keeping Your Head Down) -- Performing Enumeration -- ch. 7 Conducting Vulnerability Scanning -- Introduction to Vulnerability Scanning -- Recognizing the Limitations of Vulnerability Scanning -- Outlining the Vulnerability Scanning Process -- Types of Scans That Can Be Performed -- ch. 8 Cracking Passwords -- Recognizing Strong Passwords -- Choosing a Password-Cracking Technique -- Executing a Passive Online Attack -- Executing an Active Online Attack | |
505 | 8 | |a Executing an Offline Attack -- Using Nontechnical Methods -- Escalating Privileges -- ch. 9 Retaining Access with Backdoors and Malware -- Deciding How to Attack -- Installing a Backdoor with PsTools -- Opening a Shell with LAN Turtle -- Recognizing Types of Malware -- Launching Viruses -- Launching Worms -- Launching Spyware -- Inserting Trojans -- Installing Rootkits -- ch. 10 Reporting -- Reporting the Test Parameters -- Collecting Information -- Highlighting the Important Information -- Adding Supporting Documentation -- Conducting Quality Assurance -- ch. 11 Working with Defensive and Detection Systems -- Detecting Intrusions -- Recognizing the Signs of an Intrusion -- Evading an IDS -- Breaching a Firewall -- Using Honeypots: The Wolf in Sheep's Clothing -- ch. 12 Covering Your Tracks and Evading Detection -- Recognizing the Motivations for Evasion -- Getting Rid of Log Files -- Hiding Files -- Evading Antivirus Software | |
505 | 8 | |a Evading Defenses by Entering Through a Backdoor -- Using Rootkits for Evasion -- ch. 13 Detecting and Targeting Wireless -- An Introduction to Wireless -- Breaking Wireless Encryption Technologies -- Conducting a Wardriving Attack -- Conducting Other Types of Attack -- Choosing Tools to Attack Wireless -- Knocking Out Bluetooth -- Hacking the Internet of Things (IoT) -- ch. 14 Dealing with Mobile Device Security -- Recognizing Current-Generation Mobile Devices -- Working with Android OS -- Working with Apple iOS -- Finding Security Holes in Mobile Devices -- Encountering Bring Your Own Device (BYOD) -- Choosing Tools to Test Mobile Devices -- ch. 15 Performing Social Engineering -- Introduction to Social Engineering -- Exploiting Human Traits -- Acting Like a Social Engineer -- Targeting Specific Victims -- Leveraging Social Networking -- Conducting Safer Social Networking -- ch. 16 Hardening a Host System -- Introduction to Hardening | |
505 | 8 | |a Three Tenets of Defense -- Creating a Security Baseline -- Hardening with Group Policy -- Hardening Desktop Security -- Backing Up a System -- ch. 17 Hardening Your Network -- Introduction to Network Hardening -- Intrusion Detection Systems -- Firewalls -- Physical Security Controls -- ch. 18 Navigating the Path to Job Success -- Choosing Your Career Path -- Build a Library -- Practice Technical Writing -- Display Your Skills -- ch. 19 Building a Test Lab for Penetration Testing -- Deciding to Build a Lab -- Considering Virtualization -- Getting Starting and What You Will Need -- Installing Software. | |
506 | 1 | |a Legal Deposit;|c Only available on premises controlled by the deposit library and to one user at any one time;|e The Legal Deposit Libraries (Non-Print Works) Regulations (UK).|5 WlAbNL | |
520 | |a IT Security certifications have stringent requirements and demand a complex body of knowledge. This essential guide lays the groundwork for any IT professional hoping to move into a cybersecurity career by developing a robust pen tester skill set. --|c Edited summary from book. | ||
540 | |a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.|5 WlAbNL | ||
588 | 0 | |a Online resource; title from PDF title page (EBSCO, viewed July 1, 2019) | |
590 | |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition | ||
650 | 0 | |a Computer security.|9 65527 | |
650 | 0 | |a Hackers.|9 69413 | |
650 | 0 | |a Hacking.|9 404059 | |
650 | 2 | |a Computer Security|9 65527 | |
776 | 0 | 8 | |i Print version:|z 9781119323983 |
856 | 4 | 0 | |u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781119235309/?ar|x O'Reilly|z eBook |
938 | |a Askews and Holts Library Services|b ASKH|n AH30994290 | ||
938 | |a Askews and Holts Library Services|b ASKH|n AH32109554 | ||
938 | |a ProQuest Ebook Central|b EBLB|n EBL4745627 | ||
938 | |a ProQuest Ebook Central|b EBLB|n EBL5086913 | ||
938 | |a EBSCOhost|b EBSC|n 1423169 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection|b IDEB|n cis37056388 | ||
938 | |a YBP Library Services|b YANK|n 13270688 | ||
938 | |a YBP Library Services|b YANK|n 14723961 | ||
938 | |a YBP Library Services|b YANK|n 15101268 | ||
994 | |a 92|b VIA | ||
999 | |c 281253|d 281253 |