skip to content
Advanced penetration testing for highly-secured environments : the ultimate security guide Preview this item
ClosePreview this item
Checking...

Advanced penetration testing for highly-secured environments : the ultimate security guide

Author: Lee Allen
Publisher: Birmingham : Packt Pub., 2012.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Database:WorldCat
Summary:
An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with mature security infrastructure. Understand how to perform each stage of the penetration test by gaining hands-on experience in performing attacks that mimic those seen in the wild. In the end, take the challenge and  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Lee Allen
ISBN: 9781849517751 1849517754
OCLC Number: 794903866
Description: 1 online resource
Contents: Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide; Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; 1. Planning and Scoping for a Successful Penetration Test.
Responsibility: Lee Allen.

Abstract:

An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with mature security infrastructure. Understand how to perform each stage of the penetration test by gaining hands-on experience in performing attacks that mimic those seen in the wild. In the end, take the challenge and perform a virtual penetration test against a fictional corporation. If you are looking for guidance and detailed instructions on how to perform a penetration test from start to finish, are looking to build out your own penetration testing lab, or are looking to improve on your existing penetration testing skills, this book is for you. Although the books attempts to accommodate those that are still new to the penetration testing field, experienced testers should be able to gain knowledge and hands-on experience as well. The book does assume that you have some experience in web application testing and as such the chapter regarding this subject may require you to understand the basic concepts of web security. The reader should also be familiar with basic IT concepts, and commonly used protocols such as TCP/IP.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/794903866> # Advanced penetration testing for highly-secured environments : the ultimate security guide
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "794903866" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/enk> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1212620731#Place/birmingham> ; # Birmingham
    schema:about <http://id.loc.gov/authorities/subjects/sh94001277> ; # Computer networks--Security measures
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://dewey.info/class/005.8/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1212620731#Topic/computers_networking_security> ; # COMPUTERS--Networking--Security
    schema:about <http://id.loc.gov/authorities/subjects/sh2009121243> ; # Computer security--Management
    schema:about <http://id.worldcat.org/fast/1789566> ; # Penetration testing (Computer security)
    schema:about <http://id.worldcat.org/fast/872493> ; # Computer security--Management
    schema:about <http://experiment.worldcat.org/entity/work/data/1212620731#Topic/computers_security_general> ; # COMPUTERS--Security--General
    schema:about <http://experiment.worldcat.org/entity/work/data/1212620731#Topic/computers_internet_security> ; # COMPUTERS--Internet--Security
    schema:bookFormat schema:EBook ;
    schema:creator <http://viaf.org/viaf/26304091> ; # Lee Allen
    schema:datePublished "2012" ;
    schema:description "An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with mature security infrastructure. Understand how to perform each stage of the penetration test by gaining hands-on experience in performing attacks that mimic those seen in the wild. In the end, take the challenge and perform a virtual penetration test against a fictional corporation. If you are looking for guidance and detailed instructions on how to perform a penetration test from start to finish, are looking to build out your own penetration testing lab, or are looking to improve on your existing penetration testing skills, this book is for you. Although the books attempts to accommodate those that are still new to the penetration testing field, experienced testers should be able to gain knowledge and hands-on experience as well. The book does assume that you have some experience in web application testing and as such the chapter regarding this subject may require you to understand the basic concepts of web security. The reader should also be familiar with basic IT concepts, and commonly used protocols such as TCP/IP."@en ;
    schema:description "Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide; Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; 1. Planning and Scoping for a Successful Penetration Test."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1212620731> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:name "Advanced penetration testing for highly-secured environments : the ultimate security guide"@en ;
    schema:productID "794903866" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/794903866#PublicationEvent/birmingham_packt_pub_2012> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1212620731#Agent/packt_pub> ; # Packt Pub.
    schema:url <http://public.eblib.com/EBLPublic/PublicView.do?ptiID=946941> ;
    schema:url <http://www.myilibrary.com?id=365440> ;
    schema:url <http://cdn.totalboox.com/static/covers/PT/5d15138647df761c-b.jpg> ;
    schema:url <http://er.llcc.edu:2048/login?url=http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=456955> ;
    schema:url <http://www.myilibrary.com?id=365440&ref=toc> ;
    schema:url <http://ebookcentral.proquest.com/lib/gprc-ebooks/detail.action?docID=946941> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=456955> ;
    schema:url <http://ebookcentral.proquest.com/lib/macewan-ebooks/detail.action?docID=946941> ;
    schema:url <http://public.eblib.com/choice/publicfullrecord.aspx?p=946941> ;
    schema:url <http://www.totalboox.com/book/id-6707288687490594332> ;
    schema:url <http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=456955> ;
    schema:url <http://ebookcentral.proquest.com/lib/concordiaab-ebooks/detail.action?docID=946941> ;
    schema:url <http://ebookcentral.proquest.com/lib/rdc/detail.action?docID=946941> ;
    schema:workExample <http://worldcat.org/isbn/9781849517751> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/794903866> ;
    .


Related Entities

<http://ebookcentral.proquest.com/lib/concordiaab-ebooks/detail.action?docID=946941>
    rdfs:comment "from Ebook Central Academic Complete" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .

<http://ebookcentral.proquest.com/lib/gprc-ebooks/detail.action?docID=946941>
    rdfs:comment "from Ebook Central Academic Complete" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .

<http://ebookcentral.proquest.com/lib/macewan-ebooks/detail.action?docID=946941>
    rdfs:comment "from Ebook Central Academic Complete" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .

<http://ebookcentral.proquest.com/lib/rdc/detail.action?docID=946941>
    rdfs:comment "from Ebook Central Academic Complete" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1212620731#Topic/computers_internet_security> # COMPUTERS--Internet--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Internet--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1212620731#Topic/computers_networking_security> # COMPUTERS--Networking--Security
    a schema:Intangible ;
    schema:name "COMPUTERS--Networking--Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/1212620731#Topic/computers_security_general> # COMPUTERS--Security--General
    a schema:Intangible ;
    schema:name "COMPUTERS--Security--General"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh2009121243> # Computer security--Management
    a schema:Intangible ;
    schema:name "Computer security--Management"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh94001277> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/1789566> # Penetration testing (Computer security)
    a schema:Intangible ;
    schema:name "Penetration testing (Computer security)"@en ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872493> # Computer security--Management
    a schema:Intangible ;
    schema:name "Computer security--Management"@en ;
    .

<http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=e000xna&AN=456955>
    rdfs:comment "from EBSCO Academic Collection" ;
    rdfs:comment "(Unlimited Concurrent Users)" ;
    .

<http://viaf.org/viaf/26304091> # Lee Allen
    a schema:Person ;
    schema:familyName "Allen" ;
    schema:givenName "Lee" ;
    schema:name "Lee Allen" ;
    .

<http://worldcat.org/isbn/9781849517751>
    a schema:ProductModel ;
    schema:isbn "1849517754" ;
    schema:isbn "9781849517751" ;
    .

<http://www.worldcat.org/title/-/oclc/794903866>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/794903866> ; # Advanced penetration testing for highly-secured environments : the ultimate security guide
    schema:dateModified "2017-06-02" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.