Advanced penetration testing for highly-secured environments :: the ultimate security guide /
An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with mature security infrastructure. Understand how to perform each stage of the penetration test by gaining...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Pub.,
2012.
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with mature security infrastructure. Understand how to perform each stage of the penetration test by gaining hands-on experience in performing attacks that mimic those seen in the wild. In the end, take the challenge and perform a virtual penetration test against a fictional corporation. If you are looking for guidance and detailed instructions on how to perform a penetration test from start to finish, are looking to build out your own penetration testing lab, or are looking to improve on your existing penetration testing skills, this book is for you. Although the books attempts to accommodate those that are still new to the penetration testing field, experienced testers should be able to gain knowledge and hands-on experience as well. The book does assume that you have some experience in web application testing and as such the chapter regarding this subject may require you to understand the basic concepts of web security. The reader should also be familiar with basic IT concepts, and commonly used protocols such as TCP/IP. |
Beschreibung: | 1 online resource (1 online resource) |
ISBN: | 9781849517751 1849517754 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn794903866 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 120604s2012 enk o 000 0 eng d | ||
040 | |a IDEBK |b eng |e pn |c IDEBK |d N$T |d EBLCP |d MERUC |d OCLCQ |d OCLCF |d DEBSZ |d OCLCQ |d OCLCO |d OCLCQ |d YDXCP |d OCLCQ |d FEM |d JBG |d AGLDB |d Z5A |d ZCU |d OCLCQ |d OCLCA |d VTS |d ICG |d OCLCQ |d STF |d DKC |d AU@ |d OCLCQ |d M8D |d OCLCQ |d K6U |d MNU |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d OCLCL |d SXB |d OCLCQ | ||
019 | |a 968010963 |a 969083684 |a 1189798738 | ||
020 | |a 9781849517751 |q (electronic bk.) | ||
020 | |a 1849517754 |q (electronic bk.) | ||
035 | |a (OCoLC)794903866 |z (OCoLC)968010963 |z (OCoLC)969083684 |z (OCoLC)1189798738 | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Allen, Lee |c (Information security specialist) |1 https://id.oclc.org/worldcat/entity/E39PCjqVyfd9R6JJjMYxthCTVC |0 http://id.loc.gov/authorities/names/no2021136571 | |
245 | 1 | 0 | |a Advanced penetration testing for highly-secured environments : |b the ultimate security guide / |c Lee Allen. |
260 | |a Birmingham : |b Packt Pub., |c 2012. | ||
300 | |a 1 online resource (1 online resource) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |2 rda | ||
520 | |a An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with mature security infrastructure. Understand how to perform each stage of the penetration test by gaining hands-on experience in performing attacks that mimic those seen in the wild. In the end, take the challenge and perform a virtual penetration test against a fictional corporation. If you are looking for guidance and detailed instructions on how to perform a penetration test from start to finish, are looking to build out your own penetration testing lab, or are looking to improve on your existing penetration testing skills, this book is for you. Although the books attempts to accommodate those that are still new to the penetration testing field, experienced testers should be able to gain knowledge and hands-on experience as well. The book does assume that you have some experience in web application testing and as such the chapter regarding this subject may require you to understand the basic concepts of web security. The reader should also be familiar with basic IT concepts, and commonly used protocols such as TCP/IP. | ||
505 | 0 | |a Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide; Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; 1. Planning and Scoping for a Successful Penetration Test. | |
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 0 | |a Computer security |x Management. | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Sécurité informatique |x Gestion. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Computer security |x Management |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
758 | |i has work: |a Advanced penetration testing for highly-secured environments (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGVvWHD8TcHmFFwxcWfj83 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
966 | 4 | 0 | |l DE-862 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=456955 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=456955 |3 Volltext |
938 | |a EBL - Ebook Library |b EBLB |n EBL946941 | ||
938 | |a EBSCOhost |b EBSC |n 456955 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n 365440 | ||
938 | |a YBP Library Services |b YANK |n 7661326 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn794903866 |
---|---|
_version_ | 1826941685500739584 |
adam_text | |
any_adam_object | |
author | Allen, Lee (Information security specialist) |
author_GND | http://id.loc.gov/authorities/names/no2021136571 |
author_facet | Allen, Lee (Information security specialist) |
author_role | |
author_sort | Allen, Lee (Information security specialist) |
author_variant | l a la |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide; Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; 1. Planning and Scoping for a Successful Penetration Test. |
ctrlnum | (OCoLC)794903866 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04586cam a2200577 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn794903866</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">120604s2012 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">IDEBK</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">IDEBK</subfield><subfield code="d">N$T</subfield><subfield code="d">EBLCP</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">FEM</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">Z5A</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">VTS</subfield><subfield code="d">ICG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">STF</subfield><subfield code="d">DKC</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">MNU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">968010963</subfield><subfield code="a">969083684</subfield><subfield code="a">1189798738</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849517751</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849517754</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)794903866</subfield><subfield code="z">(OCoLC)968010963</subfield><subfield code="z">(OCoLC)969083684</subfield><subfield code="z">(OCoLC)1189798738</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Allen, Lee</subfield><subfield code="c">(Information security specialist)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjqVyfd9R6JJjMYxthCTVC</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2021136571</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advanced penetration testing for highly-secured environments :</subfield><subfield code="b">the ultimate security guide /</subfield><subfield code="c">Lee Allen.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Pub.,</subfield><subfield code="c">2012.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 online resource)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="2">rda</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with mature security infrastructure. Understand how to perform each stage of the penetration test by gaining hands-on experience in performing attacks that mimic those seen in the wild. In the end, take the challenge and perform a virtual penetration test against a fictional corporation. If you are looking for guidance and detailed instructions on how to perform a penetration test from start to finish, are looking to build out your own penetration testing lab, or are looking to improve on your existing penetration testing skills, this book is for you. Although the books attempts to accommodate those that are still new to the penetration testing field, experienced testers should be able to gain knowledge and hands-on experience as well. The book does assume that you have some experience in web application testing and as such the chapter regarding this subject may require you to understand the basic concepts of web security. The reader should also be familiar with basic IT concepts, and commonly used protocols such as TCP/IP.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide; Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; 1. Planning and Scoping for a Successful Penetration Test.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="x">Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="x">Gestion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="x">Management</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Advanced penetration testing for highly-secured environments (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGVvWHD8TcHmFFwxcWfj83</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=456955</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=456955</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL946941</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">456955</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">365440</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">7661326</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn794903866 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:16:02Z |
institution | BVB |
isbn | 9781849517751 1849517754 |
language | English |
oclc_num | 794903866 |
open_access_boolean | |
owner | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | MAIN DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 1 online resource (1 online resource) |
psigel | ZDB-4-EBA FWS_PDA_EBA ZDB-4-EBA |
publishDate | 2012 |
publishDateSearch | 2012 |
publishDateSort | 2012 |
publisher | Packt Pub., |
record_format | marc |
spelling | Allen, Lee (Information security specialist) https://id.oclc.org/worldcat/entity/E39PCjqVyfd9R6JJjMYxthCTVC http://id.loc.gov/authorities/names/no2021136571 Advanced penetration testing for highly-secured environments : the ultimate security guide / Lee Allen. Birmingham : Packt Pub., 2012. 1 online resource (1 online resource) text txt rdacontent computer c rdamedia online resource cr rdacarrier text file rda An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with mature security infrastructure. Understand how to perform each stage of the penetration test by gaining hands-on experience in performing attacks that mimic those seen in the wild. In the end, take the challenge and perform a virtual penetration test against a fictional corporation. If you are looking for guidance and detailed instructions on how to perform a penetration test from start to finish, are looking to build out your own penetration testing lab, or are looking to improve on your existing penetration testing skills, this book is for you. Although the books attempts to accommodate those that are still new to the penetration testing field, experienced testers should be able to gain knowledge and hands-on experience as well. The book does assume that you have some experience in web application testing and as such the chapter regarding this subject may require you to understand the basic concepts of web security. The reader should also be familiar with basic IT concepts, and commonly used protocols such as TCP/IP. Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide; Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; 1. Planning and Scoping for a Successful Penetration Test. Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Tests d'intrusion. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security Management fast Penetration testing (Computer security) fast has work: Advanced penetration testing for highly-secured environments (Text) https://id.oclc.org/worldcat/entity/E39PCGVvWHD8TcHmFFwxcWfj83 https://id.oclc.org/worldcat/ontology/hasWork |
spellingShingle | Allen, Lee (Information security specialist) Advanced penetration testing for highly-secured environments : the ultimate security guide / Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide; Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Errata; Piracy; Questions; 1. Planning and Scoping for a Successful Penetration Test. Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Tests d'intrusion. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security Management fast Penetration testing (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2011003137 http://id.loc.gov/authorities/subjects/sh94001277 |
title | Advanced penetration testing for highly-secured environments : the ultimate security guide / |
title_auth | Advanced penetration testing for highly-secured environments : the ultimate security guide / |
title_exact_search | Advanced penetration testing for highly-secured environments : the ultimate security guide / |
title_full | Advanced penetration testing for highly-secured environments : the ultimate security guide / Lee Allen. |
title_fullStr | Advanced penetration testing for highly-secured environments : the ultimate security guide / Lee Allen. |
title_full_unstemmed | Advanced penetration testing for highly-secured environments : the ultimate security guide / Lee Allen. |
title_short | Advanced penetration testing for highly-secured environments : |
title_sort | advanced penetration testing for highly secured environments the ultimate security guide |
title_sub | the ultimate security guide / |
topic | Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer security Management. Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Tests d'intrusion. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Computer security Management fast Penetration testing (Computer security) fast |
topic_facet | Penetration testing (Computer security) Computer security Management. Computer networks Security measures. Tests d'intrusion. Sécurité informatique Gestion. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Computer security Management |
work_keys_str_mv | AT allenlee advancedpenetrationtestingforhighlysecuredenvironmentstheultimatesecurityguide |