The business of hacking: creating, developing, and maintaining an effective penetration testing team
There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no litera...
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
New York, NY
Apress
[2024]
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9798868801747/?ar |
Zusammenfassung: | There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that. The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client's requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience. The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions. |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource (xiii, 306 Seiten) illustrations |
ISBN: | 9798868801747 |
Internformat
MARC
LEADER | 00000nam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-104372168 | ||
003 | DE-627-1 | ||
005 | 20240701091204.0 | ||
007 | cr uuu---uuuuu | ||
008 | 240701s2024 xx |||||o 00| ||eng c | ||
020 | |a 9798868801747 |c electronic bk. |9 979-8-8688-0174-7 | ||
035 | |a (DE-627-1)104372168 | ||
035 | |a (DE-599)KEP104372168 | ||
035 | |a (ORHE)9798868801747 | ||
035 | |a (DE-627-1)104372168 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a UR |2 bicssc | |
072 | 7 | |a UTN |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
082 | 0 | |a 005.8 |2 23/eng/20240619 | |
100 | 1 | |a Butler, Michael |e VerfasserIn |4 aut | |
245 | 1 | 4 | |a The business of hacking |b creating, developing, and maintaining an effective penetration testing team |c Michael Butler and Jacob G. Oakley |
250 | |a [First edition]. | ||
264 | 1 | |a New York, NY |b Apress |c [2024] | |
300 | |a 1 Online-Ressource (xiii, 306 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that. The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client's requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience. The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions. | ||
650 | 0 | |a Penetration testing (Computer security) |x Management | |
650 | 0 | |a Hacking | |
650 | 4 | |a Tests d'intrusion ; Gestion | |
650 | 4 | |a Piratage informatique | |
700 | 1 | |a Oakley, Jacob G. |e VerfasserIn |4 aut | |
776 | 1 | |z 9798868801730 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9798868801730 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9798868801747/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-104372168 |
---|---|
_version_ | 1821494930229428224 |
adam_text | |
any_adam_object | |
author | Butler, Michael Oakley, Jacob G. |
author_facet | Butler, Michael Oakley, Jacob G. |
author_role | aut aut |
author_sort | Butler, Michael |
author_variant | m b mb j g o jg jgo |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)104372168 (DE-599)KEP104372168 (ORHE)9798868801747 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03126nam a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-104372168</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240701091204.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240701s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9798868801747</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">979-8-8688-0174-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104372168</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP104372168</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9798868801747</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)104372168</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UR</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">UTN</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240619</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Butler, Michael</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The business of hacking</subfield><subfield code="b">creating, developing, and maintaining an effective penetration testing team</subfield><subfield code="c">Michael Butler and Jacob G. Oakley</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York, NY</subfield><subfield code="b">Apress</subfield><subfield code="c">[2024]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xiii, 306 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that. The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client's requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience. The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="x">Management</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion ; Gestion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oakley, Jacob G.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9798868801730</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9798868801730</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9798868801747/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-104372168 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:22:12Z |
institution | BVB |
isbn | 9798868801747 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xiii, 306 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2024 |
publishDateSearch | 2024 |
publishDateSort | 2024 |
publisher | Apress |
record_format | marc |
spelling | Butler, Michael VerfasserIn aut The business of hacking creating, developing, and maintaining an effective penetration testing team Michael Butler and Jacob G. Oakley [First edition]. New York, NY Apress [2024] 1 Online-Ressource (xiii, 306 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that. The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client's requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience. The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions. Penetration testing (Computer security) Management Hacking Tests d'intrusion ; Gestion Piratage informatique Oakley, Jacob G. VerfasserIn aut 9798868801730 Erscheint auch als Druck-Ausgabe 9798868801730 |
spellingShingle | Butler, Michael Oakley, Jacob G. The business of hacking creating, developing, and maintaining an effective penetration testing team Penetration testing (Computer security) Management Hacking Tests d'intrusion ; Gestion Piratage informatique |
title | The business of hacking creating, developing, and maintaining an effective penetration testing team |
title_auth | The business of hacking creating, developing, and maintaining an effective penetration testing team |
title_exact_search | The business of hacking creating, developing, and maintaining an effective penetration testing team |
title_full | The business of hacking creating, developing, and maintaining an effective penetration testing team Michael Butler and Jacob G. Oakley |
title_fullStr | The business of hacking creating, developing, and maintaining an effective penetration testing team Michael Butler and Jacob G. Oakley |
title_full_unstemmed | The business of hacking creating, developing, and maintaining an effective penetration testing team Michael Butler and Jacob G. Oakley |
title_short | The business of hacking |
title_sort | business of hacking creating developing and maintaining an effective penetration testing team |
title_sub | creating, developing, and maintaining an effective penetration testing team |
topic | Penetration testing (Computer security) Management Hacking Tests d'intrusion ; Gestion Piratage informatique |
topic_facet | Penetration testing (Computer security) Management Hacking Tests d'intrusion ; Gestion Piratage informatique |
work_keys_str_mv | AT butlermichael thebusinessofhackingcreatingdevelopingandmaintaininganeffectivepenetrationtestingteam AT oakleyjacobg thebusinessofhackingcreatingdevelopingandmaintaininganeffectivepenetrationtestingteam AT butlermichael businessofhackingcreatingdevelopingandmaintaininganeffectivepenetrationtestingteam AT oakleyjacobg businessofhackingcreatingdevelopingandmaintaininganeffectivepenetrationtestingteam |