| |
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA990009739080403321 |
|
|
Autore |
Mill, John Stuart |
|
|
Titolo |
A system of logic ratiocinative and inductive : being a connected view of the principles of evidence and the methods of scientific investigation : volume VIII / by John Stuart Mill |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Toronto ; London : University of Toronto press : Routledge & Kegan Paul, 1974 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Descrizione fisica |
|
|
|
|
|
|
Locazione |
|
|
|
|
|
|
Collocazione |
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
2. |
Record Nr. |
UNINA9910254749303321 |
|
|
Autore |
Messier Ric |
|
|
Titolo |
Penetration Testing Basics [[electronic resource] ] : A Quick-Start Guide to Breaking into Systems / / by Ric Messier |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Berkeley, CA : , : Apress : , : Imprint : Apress, , 2016 |
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st ed. 2016.] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (XV, 114 p. 41 illus., 34 illus. in color.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Data protection |
Computer programming |
Software engineering |
Security |
Programming Techniques |
Software Engineering |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
1. What Is Penetration Testing? -- 2. Digging for Information -- 3. What’s Open? -- 4. Vulnerabilities -- 5. Exploitation -- 6. Breaking Web Sites -- 7. Reporting. |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. Penetration Testing Basics explains: How to identify security vulnerabilities How to use some of the top security tools in order to identify holes How to read reports from testing tools Common vulnerability types and attacks Common Web-based attacks and exposures as well as recommendations for closing those holes. |
|
|
|
|
|
|
|
| |