Professional penetration testing: creating and operating a formal hacking lab
Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price! Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benef...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, Mass. Oxford
Syngress Elsevier Science [distributor]
© 2010
|
Schlagworte: | |
Online-Zugang: | FLA01 URL des Erstveröffentlichers |
Zusammenfassung: | Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price! Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. Penetration testing is the act of testing a network to find security vulnerabilities before they are exploited by phishers, digital piracy groups, and countless other organized or individual malicious hackers. The material presented will be useful to beginners all the way through to advanced practitioners. Find out how to turn hacking and pen testing skills into a professional career Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester Learn through video - the DVD includes instructional videos that replicate classroom instruction and live, real-world vulnerability simulations of complete servers with known and unknown vulnerabilities to practice hacking skills in a controlled lab environment |
Beschreibung: | Includes bibliographical references and index |
Beschreibung: | 1 online resource (xix, 504 pages) |
ISBN: | 9780080960944 0080960944 1282309250 9781282309258 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046125372 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190827s2010 |||| o||u| ||||||eng d | ||
015 | |a GBB6C2282 |2 dnb | ||
020 | |a 9780080960944 |9 978-0-08-096094-4 | ||
020 | |a 0080960944 |9 0-08-096094-4 | ||
020 | |a 1282309250 |9 1-282-30925-0 | ||
020 | |a 9781282309258 |9 978-1-282-30925-8 | ||
035 | |a (ZDB-33-ESD)ocn500575246 | ||
035 | |a (OCoLC)500575246 | ||
035 | |a (DE-599)BVBBV046125372 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8068 |2 22 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Wilhelm, Thomas |e Verfasser |4 aut | |
245 | 1 | 0 | |a Professional penetration testing |b creating and operating a formal hacking lab |c by Thomas Wilhelm |
264 | 1 | |a Rockland, Mass. |a Oxford |b Syngress |b Elsevier Science [distributor] |c © 2010 | |
300 | |a 1 online resource (xix, 504 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price! Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. Penetration testing is the act of testing a network to find security vulnerabilities before they are exploited by phishers, digital piracy groups, and countless other organized or individual malicious hackers. The material presented will be useful to beginners all the way through to advanced practitioners. Find out how to turn hacking and pen testing skills into a professional career Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester Learn through video - the DVD includes instructional videos that replicate classroom instruction and live, real-world vulnerability simulations of complete servers with known and unknown vulnerabilities to practice hacking skills in a controlled lab environment | ||
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 blmlsh | |
650 | 7 | |a Computer networks / Testing |2 blmlsh | |
650 | 7 | |a Computer hackers |2 blmlsh | |
650 | 7 | |a Hackers |2 fast | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computer networks / Testing |2 fast | |
650 | 4 | |a Computer networks / Security measures | |
650 | 4 | |a Computer networks / Testing | |
650 | 4 | |a Computer hackers | |
650 | 4 | |a Computer security |x Examinations |x Practice | |
650 | 0 | 7 | |a Rechnernetz |0 (DE-588)4070085-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Rechnernetz |0 (DE-588)4070085-9 |D s |
689 | 0 | 1 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 2 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597494259 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1597494666 (DVD) |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597494250 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597494663 |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9781597494250 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-031505826 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9781597494250 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804180444406611968 |
---|---|
any_adam_object | |
author | Wilhelm, Thomas |
author_facet | Wilhelm, Thomas |
author_role | aut |
author_sort | Wilhelm, Thomas |
author_variant | t w tw |
building | Verbundindex |
bvnumber | BV046125372 |
classification_rvk | ST 277 |
collection | ZDB-33-ESD |
ctrlnum | (ZDB-33-ESD)ocn500575246 (OCoLC)500575246 (DE-599)BVBBV046125372 |
dewey-full | 005.8068 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8068 |
dewey-search | 005.8068 |
dewey-sort | 15.8068 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04360nmm a2200685zc 4500</leader><controlfield tag="001">BV046125372</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190827s2010 |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB6C2282</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080960944</subfield><subfield code="9">978-0-08-096094-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080960944</subfield><subfield code="9">0-08-096094-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1282309250</subfield><subfield code="9">1-282-30925-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781282309258</subfield><subfield code="9">978-1-282-30925-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn500575246</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)500575246</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046125372</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8068</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wilhelm, Thomas</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Professional penetration testing</subfield><subfield code="b">creating and operating a formal hacking lab</subfield><subfield code="c">by Thomas Wilhelm</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Rockland, Mass.</subfield><subfield code="a">Oxford</subfield><subfield code="b">Syngress</subfield><subfield code="b">Elsevier Science [distributor]</subfield><subfield code="c">© 2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xix, 504 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price! Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. Penetration testing is the act of testing a network to find security vulnerabilities before they are exploited by phishers, digital piracy groups, and countless other organized or individual malicious hackers. The material presented will be useful to beginners all the way through to advanced practitioners. Find out how to turn hacking and pen testing skills into a professional career Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester Learn through video - the DVD includes instructional videos that replicate classroom instruction and live, real-world vulnerability simulations of complete servers with known and unknown vulnerabilities to practice hacking skills in a controlled lab environment</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Testing</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer hackers</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Testing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Examinations</subfield><subfield code="x">Practice</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Rechnernetz</subfield><subfield code="0">(DE-588)4070085-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597494259</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1597494666 (DVD)</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597494250</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597494663</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9781597494250</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031505826</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9781597494250</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046125372 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:35:51Z |
institution | BVB |
isbn | 9780080960944 0080960944 1282309250 9781282309258 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031505826 |
oclc_num | 500575246 |
open_access_boolean | |
physical | 1 online resource (xix, 504 pages) |
psigel | ZDB-33-ESD ZDB-33-ESD FLA_PDA_ESD |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Syngress Elsevier Science [distributor] |
record_format | marc |
spelling | Wilhelm, Thomas Verfasser aut Professional penetration testing creating and operating a formal hacking lab by Thomas Wilhelm Rockland, Mass. Oxford Syngress Elsevier Science [distributor] © 2010 1 online resource (xix, 504 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references and index Save yourself some money! This complete classroom-in-a-book on penetration testing provides material that can cost upwards of $1,000 for a fraction of the price! Thomas Wilhelm has delivered pen testing training to countless security professionals and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. Penetration testing is the act of testing a network to find security vulnerabilities before they are exploited by phishers, digital piracy groups, and countless other organized or individual malicious hackers. The material presented will be useful to beginners all the way through to advanced practitioners. Find out how to turn hacking and pen testing skills into a professional career Understand how to conduct controlled attacks on a network through real-world examples of vulnerable and exploitable servers Master project management skills necessary for running a formal penetration test and setting up a professional ethical hacking business Discover metrics and reporting methodologies that provide experience crucial to a professional penetration tester Learn through video - the DVD includes instructional videos that replicate classroom instruction and live, real-world vulnerability simulations of complete servers with known and unknown vulnerabilities to practice hacking skills in a controlled lab environment COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures blmlsh Computer networks / Testing blmlsh Computer hackers blmlsh Hackers fast Computer networks / Security measures fast Computer networks / Testing fast Computer networks / Security measures Computer networks / Testing Computer hackers Computer security Examinations Practice Rechnernetz (DE-588)4070085-9 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf Rechnernetz (DE-588)4070085-9 s Computersicherheit (DE-588)4274324-2 s Penetrationstest (DE-588)4825817-9 s 1\p DE-604 Erscheint auch als Druck-Ausgabe 1597494259 Erscheint auch als Druck-Ausgabe 1597494666 (DVD) Erscheint auch als Druck-Ausgabe 9781597494250 Erscheint auch als Druck-Ausgabe 9781597494663 http://www.sciencedirect.com/science/book/9781597494250 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Wilhelm, Thomas Professional penetration testing creating and operating a formal hacking lab COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures blmlsh Computer networks / Testing blmlsh Computer hackers blmlsh Hackers fast Computer networks / Security measures fast Computer networks / Testing fast Computer networks / Security measures Computer networks / Testing Computer hackers Computer security Examinations Practice Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Penetrationstest (DE-588)4825817-9 gnd |
subject_GND | (DE-588)4070085-9 (DE-588)4274324-2 (DE-588)4825817-9 |
title | Professional penetration testing creating and operating a formal hacking lab |
title_auth | Professional penetration testing creating and operating a formal hacking lab |
title_exact_search | Professional penetration testing creating and operating a formal hacking lab |
title_full | Professional penetration testing creating and operating a formal hacking lab by Thomas Wilhelm |
title_fullStr | Professional penetration testing creating and operating a formal hacking lab by Thomas Wilhelm |
title_full_unstemmed | Professional penetration testing creating and operating a formal hacking lab by Thomas Wilhelm |
title_short | Professional penetration testing |
title_sort | professional penetration testing creating and operating a formal hacking lab |
title_sub | creating and operating a formal hacking lab |
topic | COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computer networks / Security measures blmlsh Computer networks / Testing blmlsh Computer hackers blmlsh Hackers fast Computer networks / Security measures fast Computer networks / Testing fast Computer networks / Security measures Computer networks / Testing Computer hackers Computer security Examinations Practice Rechnernetz (DE-588)4070085-9 gnd Computersicherheit (DE-588)4274324-2 gnd Penetrationstest (DE-588)4825817-9 gnd |
topic_facet | COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computer networks / Security measures Computer networks / Testing Computer hackers Hackers Computer security Examinations Practice Rechnernetz Computersicherheit Penetrationstest |
url | http://www.sciencedirect.com/science/book/9781597494250 |
work_keys_str_mv | AT wilhelmthomas professionalpenetrationtestingcreatingandoperatingaformalhackinglab |