Ebook The ethical hack - A framework for business value penetration testing
Số trang: 331
Loại file: pdf
Dung lượng: 3.91 MB
Lượt xem: 30
Lượt tải: 0
Xem trước 10 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
Ebook "The ethical hack - A framework for business value penetration testing" includes content: Getting started, setting the stage, the framework, information security models, information security program, the business perspective, planning for a controlled attack, preparing for a hack, enumeration, vulnerability analysis, exploitation, the deliverable, integrating the results.
Nội dung trích xuất từ tài liệu:
Ebook The ethical hack - A framework for business value penetration testing The Ethical Hack A Framework for Business Value Penetration Testing OTHER INFORMATION SECURITY BOOKS FROM AUERBACH Asset Protection and Security Management Information Technology Control and Audit Handbook Fredrick Gallegos, Daniel Manson, POA Publishing and Sandra Allen-Senft ISBN: 0-8493-1603-0 ISBN: 0-8493-9994-7 Building a Global Information Assurance Investigator's Guide to Steganography Program Gregory Kipper Raymond J. Curts and Douglas E. Campbell 0-8493-2433-5 ISBN: 0-8493-1368-6 Managing a Network Vulnerability Assessment Building an Information Security Awareness Thomas Peltier, Justin Peltier, and John A. Blackley Program ISBN: 0-8493-1270-1 Mark B. Desman Network Perimeter Security: Building Defense ISBN: 0-8493-0116-5 In-Depth Critical Incident Management Cliff Riggs Alan B. Sterneckert ISBN: 0-8493-1628-6 ISBN: 0-8493-0010-X The Practical Guide to HIPAA Privacy and Cyber Crime Investigator's Field Guide Security Compliance Bruce Middleton Kevin Beaver and Rebecca Herold ISBN: 0-8493-1192-6 ISBN: 0-8493-1953-6 Cyber Forensics: A Field Manual for Collecting, A Practical Guide to Security Engineering and Examining, and Preserving Evidence of Information Assurance Computer Crimes Debra S. Herrmann Albert J. Marcella, Jr. and Robert S. Greenfield ISBN: 0-8493-1163-2 ISBN: 0-8493-0955-7 The Privacy Papers: Managing Technology, The Ethical Hack: A Framework for Business Consumer, Employee and Legislative Actions Value Penetration Testing Rebecca Herold James S. Tiller ISBN: 0-8493-1248-5 ISBN: 0-8493-1609-X Public Key Infrastructure: Building Trusted The Hacker's Handbook: The Strategy Behind Applications and Web Services Breaking into and Defending Networks John R. Vacca Susan Young and Dave Aitel ISBN: 0-8493-0822-4 ISBN: 0-8493-0888-7 Securing and Controlling Cisco Routers Information Security Architecture: Peter T. Davis An Integrated Approach to Security in the ISBN: 0-8493-1290-6 Organization Strategic Information Security Jan Killmeyer Tudor John Wylder ISBN: 0-8493-9988-2 ISBN: 0-8493-2041-0 Information Security Fundamentals Surviving Security: How to Integrate People, Thomas R. Peltier Process, and Technology, Second Edition ISBN: 0-8493-1957-9 Amanda Andress Information Security Management Handbook, ISBN: 0-8493-2042-9 5th Edition A Technical Guide to IPSec Virtual Harold F. Tipton and Micki Krause Private Networks ISBN: 0-8493-1997-8 James S. Tiller Information Security Policies, Procedures, and ISBN: 0-8493-0876-3 Standards: Guidelines for Effective Information Using the Common Criteria for IT Security Security Management Evaluation Thomas R. Peltier Debra S. Herrmann ISBN: 0-8493-1137-3 ISBN: 0-8493-1404-6 Information Security Risk Analysis Thomas R. Peltier ISBN: 0-8493-0880-1 AUERBACH PUBLICATIONS www.auerbach-publications.com To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401 E-mail: orders@crcpress.com The Ethical Hack A Framework for Business Value Penetration Testing JAMES S. TILLER AUERBACH PUBLICATIONS A CRC Press Company Boca Raton London New York Washington, D.C. The opinions expressed in this book are those of the author and do not represent opinions of International Network Services Inc. Library of Congress Cataloging-in-Publication Data Tiller, James S. The ethical hack : a framework for business value penetration testing / James S. Tiller p. cm. Includes index. ISBN 0-8493-1609-X (alk. paper) 1. Computer networks--Security measures. 2. Computer networks--Testing. 3. Computer hackers. 4. Business enterprises--Computer networks. I. Title. TK5105.59.T55 2003 005.8--dc21 2003052467 This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher. The ...
Nội dung trích xuất từ tài liệu:
Ebook The ethical hack - A framework for business value penetration testing The Ethical Hack A Framework for Business Value Penetration Testing OTHER INFORMATION SECURITY BOOKS FROM AUERBACH Asset Protection and Security Management Information Technology Control and Audit Handbook Fredrick Gallegos, Daniel Manson, POA Publishing and Sandra Allen-Senft ISBN: 0-8493-1603-0 ISBN: 0-8493-9994-7 Building a Global Information Assurance Investigator's Guide to Steganography Program Gregory Kipper Raymond J. Curts and Douglas E. Campbell 0-8493-2433-5 ISBN: 0-8493-1368-6 Managing a Network Vulnerability Assessment Building an Information Security Awareness Thomas Peltier, Justin Peltier, and John A. Blackley Program ISBN: 0-8493-1270-1 Mark B. Desman Network Perimeter Security: Building Defense ISBN: 0-8493-0116-5 In-Depth Critical Incident Management Cliff Riggs Alan B. Sterneckert ISBN: 0-8493-1628-6 ISBN: 0-8493-0010-X The Practical Guide to HIPAA Privacy and Cyber Crime Investigator's Field Guide Security Compliance Bruce Middleton Kevin Beaver and Rebecca Herold ISBN: 0-8493-1192-6 ISBN: 0-8493-1953-6 Cyber Forensics: A Field Manual for Collecting, A Practical Guide to Security Engineering and Examining, and Preserving Evidence of Information Assurance Computer Crimes Debra S. Herrmann Albert J. Marcella, Jr. and Robert S. Greenfield ISBN: 0-8493-1163-2 ISBN: 0-8493-0955-7 The Privacy Papers: Managing Technology, The Ethical Hack: A Framework for Business Consumer, Employee and Legislative Actions Value Penetration Testing Rebecca Herold James S. Tiller ISBN: 0-8493-1248-5 ISBN: 0-8493-1609-X Public Key Infrastructure: Building Trusted The Hacker's Handbook: The Strategy Behind Applications and Web Services Breaking into and Defending Networks John R. Vacca Susan Young and Dave Aitel ISBN: 0-8493-0822-4 ISBN: 0-8493-0888-7 Securing and Controlling Cisco Routers Information Security Architecture: Peter T. Davis An Integrated Approach to Security in the ISBN: 0-8493-1290-6 Organization Strategic Information Security Jan Killmeyer Tudor John Wylder ISBN: 0-8493-9988-2 ISBN: 0-8493-2041-0 Information Security Fundamentals Surviving Security: How to Integrate People, Thomas R. Peltier Process, and Technology, Second Edition ISBN: 0-8493-1957-9 Amanda Andress Information Security Management Handbook, ISBN: 0-8493-2042-9 5th Edition A Technical Guide to IPSec Virtual Harold F. Tipton and Micki Krause Private Networks ISBN: 0-8493-1997-8 James S. Tiller Information Security Policies, Procedures, and ISBN: 0-8493-0876-3 Standards: Guidelines for Effective Information Using the Common Criteria for IT Security Security Management Evaluation Thomas R. Peltier Debra S. Herrmann ISBN: 0-8493-1137-3 ISBN: 0-8493-1404-6 Information Security Risk Analysis Thomas R. Peltier ISBN: 0-8493-0880-1 AUERBACH PUBLICATIONS www.auerbach-publications.com To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401 E-mail: orders@crcpress.com The Ethical Hack A Framework for Business Value Penetration Testing JAMES S. TILLER AUERBACH PUBLICATIONS A CRC Press Company Boca Raton London New York Washington, D.C. The opinions expressed in this book are those of the author and do not represent opinions of International Network Services Inc. Library of Congress Cataloging-in-Publication Data Tiller, James S. The ethical hack : a framework for business value penetration testing / James S. Tiller p. cm. Includes index. ISBN 0-8493-1609-X (alk. paper) 1. Computer networks--Security measures. 2. Computer networks--Testing. 3. Computer hackers. 4. Business enterprises--Computer networks. I. Title. TK5105.59.T55 2003 005.8--dc21 2003052467 This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher. The ...
Tìm kiếm theo từ khóa liên quan:
The ethical hack Computer networks Security measures Computer hackers Business enterprises Vulnerability analysis Getting started Setting the stage the frameworkGợi ý tài liệu liên quan:
-
Ebook E-business and e-commerce management: Strategy, implementation and practice - Part 2
514 trang 47 0 0 -
Lecture Computer networks: Lesson 34 - Hammad Khalid Khan
18 trang 47 0 0 -
Lecture Computer networks: Lesson 41 - Hammad Khalid Khan
8 trang 43 0 0 -
Ebook Security in wireless mesh networks: Part 1
357 trang 43 0 0 -
Ebook E-business and e-commerce management: Strategy, implementation and practice - Part 1
284 trang 41 0 0 -
Ebook Security in wireless mesh networks: Part 2
191 trang 41 0 0 -
Lecture Computer networks: Lesson 40 - Hammad Khalid Khan
8 trang 40 0 0 -
Ebook Security technologies for the world wide web (Second edition): Part 2
168 trang 40 0 0 -
Lecture Computer networks: Lesson 39 - Hammad Khalid Khan
10 trang 38 0 0 -
Ebook Security technologies for the world wide web (Second edition): Part 1
273 trang 37 0 0