Penetration Testing For Dummies:
Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking...
Saved in:
Main Author: | |
---|---|
Corporate Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
[Place of publication not identified]
For Dummies
2020
|
Edition: | 1st edition. |
Series: | For dummies
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781119577485/?ar |
Summary: | Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results! |
Item Description: | Online resource; Title from title page (viewed May 19, 2020) |
Physical Description: | 1 online resource (256 pages). |
ISBN: | 9781119577485 1119577489 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-059852046 | ||
003 | DE-627-1 | ||
005 | 20240228121243.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201119s2020 xx |||||o 00| ||eng c | ||
020 | |a 9781119577485 |c paperback |9 978-1-119-57748-5 | ||
020 | |a 1119577489 |c paperback |9 1-119-57748-9 | ||
035 | |a (DE-627-1)059852046 | ||
035 | |a (DE-599)KEP059852046 | ||
035 | |a (ORHE)9781119577485 | ||
035 | |a (DE-627-1)059852046 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20230216 | |
100 | 1 | |a Shimonski, Robert |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Penetration Testing For Dummies |c Shimonski, Robert |
250 | |a 1st edition. | ||
264 | 1 | |a [Place of publication not identified] |b For Dummies |c 2020 | |
300 | |a 1 online resource (256 pages). | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
490 | 0 | |a For dummies | |
500 | |a Online resource; Title from title page (viewed May 19, 2020) | ||
520 | |a Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results! | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Hacking | |
650 | 0 | |a Securities |x Data processing | |
650 | 0 | |a Testing |x Data processing | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Piratage informatique | |
650 | 4 | |a Valeurs mobilières ; Informatique | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hacking | |
650 | 4 | |a Securities ; Data processing | |
650 | 4 | |a Testing ; Data processing | |
710 | 2 | |a O'Reilly for Higher Education (Firm), |e MitwirkendeR |4 ctb | |
710 | 2 | |a Safari, an O'Reilly Media Company. |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781119577461 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119577461 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119577485/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-059852046 |
---|---|
_version_ | 1833357043306594305 |
adam_text | |
any_adam_object | |
author | Shimonski, Robert |
author_corporate | O'Reilly for Higher Education (Firm) Safari, an O'Reilly Media Company |
author_corporate_role | ctb ctb |
author_facet | Shimonski, Robert O'Reilly for Higher Education (Firm) Safari, an O'Reilly Media Company |
author_role | aut |
author_sort | Shimonski, Robert |
author_variant | r s rs |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)059852046 (DE-599)KEP059852046 (ORHE)9781119577485 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03012cam a22005532c 4500</leader><controlfield tag="001">ZDB-30-ORH-059852046</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121243.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201119s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119577485</subfield><subfield code="c">paperback</subfield><subfield code="9">978-1-119-57748-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119577489</subfield><subfield code="c">paperback</subfield><subfield code="9">1-119-57748-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)059852046</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP059852046</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119577485</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)059852046</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230216</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Shimonski, Robert</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Penetration Testing For Dummies</subfield><subfield code="c">Shimonski, Robert</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">For Dummies</subfield><subfield code="c">2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (256 pages).</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">For dummies</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; Title from title page (viewed May 19, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results!</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Securities</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Testing</subfield><subfield code="x">Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Valeurs mobilières ; Informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Securities ; Data processing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Testing ; Data processing</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">O'Reilly for Higher Education (Firm),</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">Safari, an O'Reilly Media Company.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119577461</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119577461</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119577485/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-059852046 |
illustrated | Not Illustrated |
indexdate | 2025-05-28T09:45:24Z |
institution | BVB |
isbn | 9781119577485 1119577489 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (256 pages). |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | For Dummies |
record_format | marc |
series2 | For dummies |
spelling | Shimonski, Robert VerfasserIn aut Penetration Testing For Dummies Shimonski, Robert 1st edition. [Place of publication not identified] For Dummies 2020 1 online resource (256 pages). Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier For dummies Online resource; Title from title page (viewed May 19, 2020) Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results! Computer security Hacking Securities Data processing Testing Data processing Sécurité informatique Piratage informatique Valeurs mobilières ; Informatique Securities ; Data processing Testing ; Data processing O'Reilly for Higher Education (Firm), MitwirkendeR ctb Safari, an O'Reilly Media Company. MitwirkendeR ctb 9781119577461 Erscheint auch als Druck-Ausgabe 9781119577461 |
spellingShingle | Shimonski, Robert Penetration Testing For Dummies Computer security Hacking Securities Data processing Testing Data processing Sécurité informatique Piratage informatique Valeurs mobilières ; Informatique Securities ; Data processing Testing ; Data processing |
title | Penetration Testing For Dummies |
title_auth | Penetration Testing For Dummies |
title_exact_search | Penetration Testing For Dummies |
title_full | Penetration Testing For Dummies Shimonski, Robert |
title_fullStr | Penetration Testing For Dummies Shimonski, Robert |
title_full_unstemmed | Penetration Testing For Dummies Shimonski, Robert |
title_short | Penetration Testing For Dummies |
title_sort | penetration testing for dummies |
topic | Computer security Hacking Securities Data processing Testing Data processing Sécurité informatique Piratage informatique Valeurs mobilières ; Informatique Securities ; Data processing Testing ; Data processing |
topic_facet | Computer security Hacking Securities Data processing Testing Data processing Sécurité informatique Piratage informatique Valeurs mobilières ; Informatique Securities ; Data processing Testing ; Data processing |
work_keys_str_mv | AT shimonskirobert penetrationtestingfordummies AT oreillyforhighereducationfirm penetrationtestingfordummies AT safarianoreillymediacompany penetrationtestingfordummies |