Bild 1 von 1

Galerie
Bild 1 von 1

Ähnlichen Artikel verkaufen?
Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits
US $89,11
Ca.CHF 71,89
Artikelzustand:
Gut
Buch, das gelesen wurde, sich aber in einem guten Zustand befindet. Der Einband weist nur sehr geringfügige Beschädigungen auf, wie z.B. kleinere Schrammen, er hat aber weder Löcher, noch ist er eingerissen. Bei gebundenen Büchern ist der Schutzumschlag möglicherweise nicht mehr vorhanden. Die Bindung weist geringfügige Gebrauchsspuren auf. Die Mehrzahl der Seiten ist unbeschädigt, das heißt, es gibt kaum Knitter oder Einrisse, es wurden nur in geringem Maße Bleistiftunterstreichungen im Text vorgenommen, es gibt keine Textmarkierungen und die Randbereiche sind nicht beschrieben. Alle Seiten sind vollständig vorhanden. Genauere Einzelheiten sowie eine Beschreibung eventueller Mängel entnehmen Sie bitte dem Angebot des Verkäufers.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Versand:
Kostenlos Standard Shipping.
Standort: Sparks, Nevada, USA
Lieferung:
Lieferung zwischen Do, 21. Aug und Mi, 27. Aug nach 94104 bei heutigem Zahlungseingang
Rücknahme:
30 Tage Rückgabe. Käufer zahlt Rückversand. Wenn Sie ein eBay-Versandetikett verwenden, werden die Kosten dafür von Ihrer Rückerstattung abgezogen.
Zahlungen:
Sicher einkaufen
Der Verkäufer ist für dieses Angebot verantwortlich.
eBay-Artikelnr.:404019394786
Artikelmerkmale
- Artikelzustand
- Book Title
- Penetration Testing Fundamentals: A Hands-On Guide to Reliable Se
- Publication Date
- 2018-06-29
- ISBN
- 9780789759375
Über dieses Produkt
Product Identifiers
Publisher
Cisco Press
ISBN-10
0789759373
ISBN-13
9780789759375
eBay Product ID (ePID)
239889776
Product Key Features
Number of Pages
448 Pages
Language
English
Publication Name
Penetration Testing Fundamentals : a Hands-On Guide to Reliable Security Audits
Publication Year
2018
Subject
Security / General, Security / Networking
Type
Textbook
Subject Area
Computers
Format
Trade Paperback
Dimensions
Item Height
1.1 in
Item Weight
24.8 Oz
Item Length
8.9 in
Item Width
7 in
Additional Product Features
Intended Audience
Scholarly & Professional
LCCN
2017-963673
Dewey Edition
23
Illustrated
Yes
Dewey Decimal
005.8
Synopsis
The perfect introduction to pen testing for all IT professionals and students - Clearly explains key concepts, terminology, challenges, tools, and skills - Covers the latest penetration testing standards from NSA, PCI, and NIST Welcome to today's most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you'll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. You'll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you've learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets-and expand your career options. LEARN HOW TO - Understand what pen testing is and how it's used - Meet modern standards for comprehensive and effective testing - Review cryptography essentials every pen tester must know - Perform reconnaissance with Nmap, Google searches, and ShodanHq - Use malware as part of your pen testing toolkit - Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry - Pen test websites and web communication - Recognize SQL injection and cross-site scripting attacks - Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA - Identify Linux vulnerabilities and password cracks - Use Kali Linux for advanced pen testing - Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering - Systematically test your environment with Metasploit - Write or customize sophisticated Metasploit exploits, Leading security expert, researcher, instructor, and author Chuck Easttom II has brought together all the essential knowledge in a single comprehensive guide that covers the entire penetration testing lifecycle. Easttom integrates concepts, terminology, challenges, and theory, and walks you through every step, from planning to effective post-test reporting. He presents a start-to-finish sample project relying on free open source tools, as well as quizzes, labs, and review sections throughout. Penetration Testing Fundamentals is also the only book to cover pentesting standards from NSA, PCI, and NIST., Normal 0 false false false EN-US X-NONE X-NONE The perfect introduction to pen testing for all IT professionals and students - Clearly explains key concepts, terminology, challenges, tools, and skills - Covers the latest penetration testing standards from NSA, PCI, and NIST Welcome to today's most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you'll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. You'll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you've learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets-and expand your career options. LEARN HOW TO - Understand what pen testing is and how it's used - Meet modern standards for comprehensive and effective testing - Review cryptography essentials every pen tester must know - Perform reconnaissance with Nmap, Google searches, and ShodanHq - Use malware as part of your pen testing toolkit - Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry - Pen test websites and web communication - Recognize SQL injection and cross-site scripting attacks - Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA - Identify Linux vulnerabilities and password cracks - Use Kali Linux for advanced pen testing - Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering - Systematically test your environment with Metasploit - Write or customize sophisticated Metasploit exploits, The perfect introduction to pen testing for all IT professionals and students · Clearly explains key concepts, terminology, challenges, tools, and skills · Covers the latest penetration testing standards from NSA, PCI, and NIST Welcome to today's most useful and practical introduction to penetration testing. Chuck Easttom brings together up-to-the-minute coverage of all the concepts, terminology, challenges, and skills you'll need to be effective. Drawing on decades of experience in cybersecurity and related IT fields, Easttom integrates theory and practice, covering the entire penetration testing life cycle from planning to reporting. You'll gain practical experience through a start-to-finish sample project relying on free open source tools. Throughout, quizzes, projects, and review sections deepen your understanding and help you apply what you've learned. Including essential pen testing standards from NSA, PCI, and NIST, Penetration Testing Fundamentals will help you protect your assets-and expand your career options. LEARN HOW TO · Understand what pen testing is and how it's used · Meet modern standards for comprehensive and effective testing · Review cryptography essentials every pen tester must know · Perform reconnaissance with Nmap, Google searches, and ShodanHq · Use malware as part of your pen testing toolkit · Test for vulnerabilities in Windows shares, scripts, WMI, and the Registry · Pen test websites and web communication · Recognize SQL injection and cross-site scripting attacks · Scan for vulnerabilities with OWASP ZAP, Vega, Nessus, and MBSA · Identify Linux vulnerabilities and password cracks · Use Kali Linux for advanced pen testing · Apply general hacking technique ssuch as fake Wi-Fi hotspots and social engineering · Systematically test your environment with Metasploit · Write or customize sophisticated Metasploit exploits
LC Classification Number
QA76.9.A25
Artikelbeschreibung des Verkäufers
Info zu diesem Verkäufer
AlibrisBooks
98,6% positive Bewertungen•1.9 Mio. Artikel verkauft
Angemeldet als gewerblicher Verkäufer
Verkäuferbewertungen (515'380)
- i***e (4422)- Bewertung vom Käufer.Letzter MonatBestätigter KaufEXCELLENT!!!
- l***m (739)- Bewertung vom Käufer.Letzter MonatBestätigter KaufFast
- 4***a (54)- Bewertung vom Käufer.Letzter MonatBestätigter KaufVery fast shipping! Thanx!
Noch mehr entdecken:
- Sachbuch-Rough-Guides Bücher,
- Sachbuch Insight Guides Bücher,
- Englische Bücher Sachbuch-Rough-Guides,
- Englische Bücher Insight-Guides-Sachbuch,
- Bücher über Bücher Sachbuch-Rough-Guides,
- Reisen-Sachbuch-Rough-Guides Bücher,
- Insight-Guides-Taschenbuch-Sachbuch Bücher,
- Taschenbuch-Sachbuch-Rough-Guides Bücher,
- Bücher Sachbuch-Rough-Guides Ab 2010,
- Bücher Insight-Guides-Sachbuch Ab 2010