Dekorationsartikel gehören nicht zum Leistungsumfang.
Sprache:
Englisch
27,90 €*
Versandkostenfrei per Post / DHL
Lieferzeit 4-7 Werktage
Kategorien:
Beschreibung
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.
Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.
This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.
This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.
Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.
This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.
This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
Inhaltsverzeichnis
1. What is Penetration Testing?
2. Reconnaissance
3. Scanning
4. Exploitation
5. Web Based Exploitation
6. Maintaining Access with Backdoors and Rootkits
7. Trapping Up the Penetration Test
2. Reconnaissance
3. Scanning
4. Exploitation
5. Web Based Exploitation
6. Maintaining Access with Backdoors and Rootkits
7. Trapping Up the Penetration Test
Details
Erscheinungsjahr: | 2013 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | Kartoniert / Broschiert |
ISBN-13: | 9780124116443 |
ISBN-10: | 0124116442 |
Sprache: | Englisch |
Herstellernummer: | C2013-0-00019-9 |
Autor: | Engebretson, Patrick |
Auflage: | 2. Aufl. |
Hersteller: |
Syngress
Syngress Media |
Verantwortliche Person für die EU: | preigu, Ansas Meyer, Lengericher Landstr. 19, D-49078 Osnabrück, mail@preigu.de |
Abbildungen: | 30 illustrations |
Maße: | 10 x 190 x 236 mm |
Von/Mit: | Patrick Engebretson |
Erscheinungsdatum: | 12.09.2013 |
Gewicht: | 0,476 kg |
Inhaltsverzeichnis
1. What is Penetration Testing?
2. Reconnaissance
3. Scanning
4. Exploitation
5. Web Based Exploitation
6. Maintaining Access with Backdoors and Rootkits
7. Trapping Up the Penetration Test
2. Reconnaissance
3. Scanning
4. Exploitation
5. Web Based Exploitation
6. Maintaining Access with Backdoors and Rootkits
7. Trapping Up the Penetration Test
Details
Erscheinungsjahr: | 2013 |
---|---|
Fachbereich: | Datenkommunikation, Netze & Mailboxen |
Genre: | Informatik |
Rubrik: | Naturwissenschaften & Technik |
Medium: | Taschenbuch |
Inhalt: | Kartoniert / Broschiert |
ISBN-13: | 9780124116443 |
ISBN-10: | 0124116442 |
Sprache: | Englisch |
Herstellernummer: | C2013-0-00019-9 |
Autor: | Engebretson, Patrick |
Auflage: | 2. Aufl. |
Hersteller: |
Syngress
Syngress Media |
Verantwortliche Person für die EU: | preigu, Ansas Meyer, Lengericher Landstr. 19, D-49078 Osnabrück, mail@preigu.de |
Abbildungen: | 30 illustrations |
Maße: | 10 x 190 x 236 mm |
Von/Mit: | Patrick Engebretson |
Erscheinungsdatum: | 12.09.2013 |
Gewicht: | 0,476 kg |
Sicherheitshinweis