Danh mục

Ebook The ethical hack - A framework for business value penetration testing

Số trang: 331      Loại file: pdf      Dung lượng: 3.91 MB      Lượt xem: 30      Lượt tải: 0    
tailieu_vip

Phí tải xuống: 1,000 VND Tải xuống file đầy đủ (331 trang) 0
Xem trước 10 trang đầu tiên của tài liệu này:

Thông tin tài liệu:

Ebook "The ethical hack - A framework for business value penetration testing" includes content: Getting started, setting the stage, the framework, information security models, information security program, the business perspective, planning for a controlled attack, preparing for a hack, enumeration, vulnerability analysis, exploitation, the deliverable, integrating the results.
Nội dung trích xuất từ tài liệu:
Ebook The ethical hack - A framework for business value penetration testing The Ethical Hack A Framework for Business Value Penetration Testing OTHER INFORMATION SECURITY BOOKS FROM AUERBACH Asset Protection and Security Management Information Technology Control and Audit Handbook Fredrick Gallegos, Daniel Manson, POA Publishing and Sandra Allen-Senft ISBN: 0-8493-1603-0 ISBN: 0-8493-9994-7 Building a Global Information Assurance Investigator's Guide to Steganography Program Gregory Kipper Raymond J. Curts and Douglas E. Campbell 0-8493-2433-5 ISBN: 0-8493-1368-6 Managing a Network Vulnerability Assessment Building an Information Security Awareness Thomas Peltier, Justin Peltier, and John A. Blackley Program ISBN: 0-8493-1270-1 Mark B. Desman Network Perimeter Security: Building Defense ISBN: 0-8493-0116-5 In-Depth Critical Incident Management Cliff Riggs Alan B. Sterneckert ISBN: 0-8493-1628-6 ISBN: 0-8493-0010-X The Practical Guide to HIPAA Privacy and Cyber Crime Investigator's Field Guide Security Compliance Bruce Middleton Kevin Beaver and Rebecca Herold ISBN: 0-8493-1192-6 ISBN: 0-8493-1953-6 Cyber Forensics: A Field Manual for Collecting, A Practical Guide to Security Engineering and Examining, and Preserving Evidence of Information Assurance Computer Crimes Debra S. Herrmann Albert J. Marcella, Jr. and Robert S. Greenfield ISBN: 0-8493-1163-2 ISBN: 0-8493-0955-7 The Privacy Papers: Managing Technology, The Ethical Hack: A Framework for Business Consumer, Employee and Legislative Actions Value Penetration Testing Rebecca Herold James S. Tiller ISBN: 0-8493-1248-5 ISBN: 0-8493-1609-X Public Key Infrastructure: Building Trusted The Hacker's Handbook: The Strategy Behind Applications and Web Services Breaking into and Defending Networks John R. Vacca Susan Young and Dave Aitel ISBN: 0-8493-0822-4 ISBN: 0-8493-0888-7 Securing and Controlling Cisco Routers Information Security Architecture: Peter T. Davis An Integrated Approach to Security in the ISBN: 0-8493-1290-6 Organization Strategic Information Security Jan Killmeyer Tudor John Wylder ISBN: 0-8493-9988-2 ISBN: 0-8493-2041-0 Information Security Fundamentals Surviving Security: How to Integrate People, Thomas R. Peltier Process, and Technology, Second Edition ISBN: 0-8493-1957-9 Amanda Andress Information Security Management Handbook, ISBN: 0-8493-2042-9 5th Edition A Technical Guide to IPSec Virtual Harold F. Tipton and Micki Krause Private Networks ISBN: 0-8493-1997-8 James S. Tiller Information Security Policies, Procedures, and ISBN: 0-8493-0876-3 Standards: Guidelines for Effective Information Using the Common Criteria for IT Security Security Management Evaluation Thomas R. Peltier Debra S. Herrmann ISBN: 0-8493-1137-3 ISBN: 0-8493-1404-6 Information Security Risk Analysis Thomas R. Peltier ISBN: 0-8493-0880-1 AUERBACH PUBLICATIONS www.auerbach-publications.com To Order Call: 1-800-272-7737 • Fax: 1-800-374-3401 E-mail: orders@crcpress.com The Ethical Hack A Framework for Business Value Penetration Testing JAMES S. TILLER AUERBACH PUBLICATIONS A CRC Press Company Boca Raton London New York Washington, D.C. The opinions expressed in this book are those of the author and do not represent opinions of International Network Services Inc. Library of Congress Cataloging-in-Publication Data Tiller, James S. The ethical hack : a framework for business value penetration testing / James S. Tiller p. cm. Includes index. ISBN 0-8493-1609-X (alk. paper) 1. Computer networks--Security measures. 2. Computer networks--Testing. 3. Computer hackers. 4. Business enterprises--Computer networks. I. Title. TK5105.59.T55 2003 005.8--dc21 2003052467 This book contains information obtained from authentic and highly regarded sources. Reprinted material is quoted with permission, and sources are indicated. A wide variety of references are listed. Reasonable efforts have been made to publish reliable data and information, but the author and the publisher cannot assume responsibility for the validity of all materials or for the consequences of their use. Neither this book nor any part may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, microfilming, and recording, or by any information storage or retrieval system, without prior permission in writing from the publisher. The ...

Tài liệu được xem nhiều: