|Eingestellt in Kategorie:
Ähnlichen Artikel verkaufen?

Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits

AlibrisBooks
(463146)
Angemeldet als gewerblicher Verkäufer
US $89,11
Ca.CHF 71,89
Artikelzustand:
Gut
Ganz entspannt. Rückgaben akzeptiert.
Versand:
Kostenlos Standard Shipping.
Standort: Sparks, Nevada, USA
Lieferung:
Lieferung zwischen Do, 21. Aug und Mi, 27. Aug nach 94104 bei heutigem Zahlungseingang
Wir wenden ein spezielles Verfahren zur Einschätzung des Liefertermins an – in diese Schätzung fließen Faktoren wie die Entfernung des Käufers zum Artikelstandort, der gewählte Versandservice, die bisher versandten Artikel des Verkäufers und weitere ein. Insbesondere während saisonaler Spitzenzeiten können die Lieferzeiten abweichen.
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
     Diners Club

Sicher einkaufen

eBay-Käuferschutz
Geld zurück, wenn etwas mit diesem Artikel nicht stimmt. Mehr erfahreneBay-Käuferschutz - wird in neuem Fenster oder Tab geöffnet
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:404019394786
Zuletzt aktualisiert am 13. Aug. 2025 23:17:17 MESZAlle Änderungen ansehenAlle Änderungen ansehen

Artikelmerkmale

Artikelzustand
Gut: Buch, das gelesen wurde, sich aber in einem guten Zustand befindet. Der Einband weist nur sehr ...
Book Title
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Se
Publication Date
2018-06-29
ISBN
9780789759375

Über dieses Produkt

Product Identifiers

Publisher
Cisco Press
ISBN-10
0789759373
ISBN-13
9780789759375
eBay Product ID (ePID)
239889776

Product Key Features

Number of Pages
448 Pages
Language
English
Publication Name
Penetration Testing Fundamentals : a Hands-On Guide to Reliable Security Audits
Publication Year
2018
Subject
Security / General, Security / Networking
Type
Textbook
Author
William Easttom II
Subject Area
Computers
Format
Trade Paperback

Dimensions

Item Height
1.1 in
Item Weight
24.8 Oz
Item Length
8.9 in
Item Width
7 in

Additional Product Features

Intended Audience
Scholarly & Professional
LCCN
2017-963673
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Synopsis
The perfect introduction to pen testing for all IT professionals and students - Clearly explains key concepts, terminology, challenges, tools, and skills - Covers the latest penetration testing standards from NSA, PCI, and NIST Welcome to today's most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you'll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. You'll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you've learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets-and expand your career options. LEARN HOW TO - Understand what pen testing is and how it's used - Meet modern standards for comprehensive and effective testing - Review cryptography essentials every pen tester must know - Perform reconnaissance with Nmap, Google searches, and ShodanHq - Use malware as part of your pen testing toolkit - Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry - Pen test websites and web communication - Recognize SQL injection and cross-site scripting attacks - Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA - Identify Linux vulnerabilities and password cracks - Use Kali Linux for advanced pen testing - Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering - Systematically test your environment with Metasploit - Write or customize sophisticated Metasploit exploits, Leading security expert, researcher, instructor, and author Chuck Easttom II has brought together all the essential knowledge in a single comprehensive guide that covers the entire penetration testing lifecycle. Easttom integrates concepts, terminology, challenges, and theory, and walks you through every step, from planning to effective post-test reporting. He presents a start-to-finish sample project relying on free open source tools, as well as quizzes, labs, and review sections throughout. Penetration Testing Fundamentals is also the only book to cover pentesting standards from NSA, PCI, and NIST., Normal 0 false false false EN-US X-NONE X-NONE The perfect introduction to pen testing for all IT professionals and students - Clearly explains key concepts, terminology, challenges, tools, and skills - Covers the latest penetration testing standards from NSA, PCI, and NIST Welcome to today's most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you'll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. You'll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you've learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets-and expand your career options. LEARN HOW TO - Understand what pen testing is and how it's used - Meet modern standards for comprehensive and effective testing - Review cryptography essentials every pen tester must know - Perform reconnaissance with Nmap, Google searches, and ShodanHq - Use malware as part of your pen testing toolkit - Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry - Pen test websites and web communication - Recognize SQL injection and cross-site scripting attacks - Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA - Identify Linux vulnerabilities and password cracks - Use Kali Linux for advanced pen testing - Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering - Systematically test your environment with Metasploit - Write or customize sophisticated Metasploit exploits, The perfect introduction to pen testing for all IT professionals and students · Clearly explains key concepts, terminology, challenges, tools, and skills · Covers the latest penetration testing standards from NSA, PCI, and NIST Welcome to today's most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you'll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. You'll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you've learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets-and expand your career options. LEARN HOW TO · Understand what pen testing is and how it's used · Meet modern standards for comprehensive and effective testing · Review cryptography essentials every pen tester must know · Perform reconnaissance with Nmap, Google searches, and ShodanHq · Use malware as part of your pen testing toolkit · Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry · Pen test websites and web communication · Recognize SQL injection and cross-site scripting attacks · Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA · Identify Linux vulnerabilities and password cracks · Use Kali Linux for advanced pen testing · Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering · Systematically test your environment with Metasploit · Write or customize sophisticated Metasploit exploits
LC Classification Number
QA76.9.A25

Artikelbeschreibung des Verkäufers

Info zu diesem Verkäufer

AlibrisBooks

98,6% positive Bewertungen1.9 Mio. Artikel verkauft

Mitglied seit Mai 2008
Antwortet meist innerhalb 24 Stunden
Angemeldet als gewerblicher Verkäufer
Alibris is the premier online marketplace for independent sellers of new & used books, as well as rare & collectible titles. We connect people who love books to thousands of independent sellers around ...
Mehr anzeigen
Shop besuchenKontakt

Detaillierte Verkäuferbewertungen

Durchschnitt in den letzten 12 Monaten
Genaue Beschreibung
4.9
Angemessene Versandkosten
5.0
Lieferzeit
5.0
Kommunikation
5.0

Verkäuferbewertungen (515'380)

Alle Bewertungen
Positiv
Neutral
Negativ