-
1
Penetration testing : protecting networks and systems /
Published 2012Table of Contents: “…Introduction; Chapter 1: Introduction to Penetration Testing; Case study; Security basics; Risk management; The threat environment; Overview of the steps to penetration testing; Penetration testing versus hacking; Benefits of penetration testing; Summary; Key learning points; Questions; Chapter 2: Preparing to Conduct a Penetration Test; Approval and scope; Planning; Summary; Questions; Chapter 3: Reconnaissance; The start of the test; Physical information gathering; Other data sources; Avoiding footprinting; Key learning points; Questions; Chapter 4: Active Reconnaissance and Enumeration.…”
CONNECT
CONNECT
CONNECT
Electronic eBook -
2
Penetration testing : a hands-on introduction to hacking /
Published 2014Table of Contents: “…A Note of Thanks / Peter Van Eeckhoutte -- About This Book / Peter Van Eeckhoutte -- Part I: The Basics / Peter Van Eeckhoutte -- Part II: Assessments / Peter Van Eeckhoutte -- Part III: Attacks / Peter Van Eeckhoutte -- Part IV: Exploit Development / Peter Van Eeckhoutte -- Part V: Mobile Hacking / Peter Van Eeckhoutte -- 0. Penetration Testing Primer / Peter Van Eeckhoutte -- The Stages of the Penetration Test / Peter Van Eeckhoutte -- Pre-engagement / Peter Van Eeckhoutte -- Information Gathering / Peter Van Eeckhoutte -- Threat Modeling / Peter Van Eeckhoutte -- Vulnerability Analysis / Peter Van Eeckhoutte -- Exploitation / Peter Van Eeckhoutte -- Post Exploitation / Peter Van Eeckhoutte -- Reporting / Peter Van Eeckhoutte -- Summary / Peter Van Eeckhoutte -- 1. …”
CONNECT
Electronic eBook -
3
Penetration testing : a complete pentesting guide facilitating smooth backtracking for working hackers : a course in three modules.
Published 2016Subjects: “…Penetration testing (Computer security)…”
CONNECT
Electronic eBook -
4
Penetration testing : a guide for business and it managers.
Published 2019Subjects: “…Penetration testing (Computer security)…”
CONNECT
CONNECT
Electronic eBook -
5
-
6
Professional penetration testing : creating and operating a formal hacking lab /
Published 2010CONNECT
CONNECT
Electronic eBook -
7
Introduction to penetration testing : finding and analyzing vulnerabilities in systems and networks with Kali Linux /
Published 2015Subjects: CONNECT
Electronic Video -
8
Penetration testing essentials.
Published 2017Table of Contents: “…Ch. 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Exploring Networking Concepts -- ch. 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5 Gathering Intelligence -- Introduction to Intelligence Gathering -- Examining a Company's Web Presence…”
CONNECT
Electronic eBook -
9
Nmap for Penetration Testing: From Beginner to Advanced [Updated for 2021] /
Published 2021CONNECT
Electronic Video -
10
-
11
-
12
Advanced penetration testing : hacking the world's most secure networks /
Published 2017Subjects: “…Penetration testing (Computer security)…”
CONNECT
Electronic eBook -
13
Penetration testing essentials /
Published 2017Table of Contents: “…Ch. 1 Introduction to Penetration Testing -- Defining Penetration Testing -- Preserving Confidentiality, Integrity, and Availability -- Appreciating the Evolution of Hacking -- ch. 2 Introduction to Operating Systems and Networking -- Comparing Common Operating Systems -- Exploring Networking Concepts -- ch. 3 Introduction to Cryptography -- Recognizing the Four Goals of Cryptography -- The History of Encryption -- Speaking Intelligently About Cryptography -- Comparing Symmetric and Asymmetric Cryptography -- Transforming Data via Hashing -- A Hybrid System: Using Digital Signatures -- Working with PKI -- ch. 4 Outlining the Pen Testing Methodology -- Determining the Objective and Scope of the Job -- Choosing the Type of Test to Perform -- Gaining Permission via a Contract -- Following the Law While Testing -- ch. 5 Gathering Intelligence -- Introduction to Intelligence Gathering -- Examining a Company's Web Presence…”
CONNECT
Electronic eBook -
14
-
15
Learn Penetration Testing : Understand the Art of Penetration Testing and Develop Your White Hat Hacker Skills.
Published 2019Table of Contents: “…Cover; Title Page; Copyright and Credits; Dedication; About Packt; Contributors; Table of Contents; Preface; Section 1: The Basics; Chapter 1: Introduction to Penetration Testing; Technical requirements; What is penetration testing?…”
CONNECT
Electronic eBook -
16
AWS Penetration Testing : Implement Various Security Strategies on AWS Using Tools Such As Kali Linux, Metasploit, and Nmap.
Published 2020Table of Contents: “…Cover -- Title Page -- Copyright and Credits -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Setting Up AWS and Pentesting Environments -- Chapter 1: Building Your AWS Environment -- Technical requirements -- Exploring Amazon Web Services (AWS) -- AWS security and penetration testing -- Understanding our testing environment -- Configuring your environment -- Setting up an account -- Setting up EC2 instances -- Setting up an EC2 instance with CentOS -- Setting up a Windows host -- Attacker setup -- setting up a Kali instance -- Connecting with PuTTY…”
CONNECT
Electronic eBook -
17
-
18
Professional penetration testing : creating and learning in a hacking lab /
Published 2013Subjects: CONNECT
CONNECT
Electronic eBook -
19
Penetration testing bootcamp : quickly get up and running with pentesting techniques /
Published 2017Table of Contents: “…Planning and Preparation -- Information Gathering -- Setting up and maintaining the Command and Control Server -- Vulnerability Scanning and Metasploit -- Traffic Sniffing and Spoofing -- Password-based Attacks -- Attacks on the Network Infrastructure -- Web Application Attacks -- Cleaning Up and Getting Out -- Writing Up the Penetration Testing Report.…”
CONNECT
CONNECT
Electronic eBook -
20
The penetrometer and soil exploration /
Published 1982Subjects: “…Soil penetration test.…”
CONNECT
Electronic eBook