1.

Record Nr.

UNINA990006357690403321

Autore

Bartlsperger, Richard

Titolo

Der Ruckfall stationierungsrechtlich genutzten fruheren Reichsvermogens : zur Ausfuhrung und Anwendung von Art. 134 Grundgesetz / Richard Bartlsperger

Pubbl/distr/stampa

Berlin : Duncker und Humblot, 1994

Descrizione fisica

270 p. ; 23 cm

Collana

Schriften zum öffentlichen Recht ; 665

Disciplina

343.025

Locazione

FGBC

Collocazione

COLLEZ. 147 (665)

Lingua di pubblicazione

Non definito

Formato

Materiale a stampa

Livello bibliografico

Monografia



2.

Record Nr.

UNINA9910781524403321

Autore

Tiller James S.

Titolo

CISO's guide to penetration testing : a framework to plan, manage, and maximize benefits / / James S. Tiller

Pubbl/distr/stampa

Boca Raton, Fla. : , : CRC Press, , 2012

ISBN

1-4665-1685-2

0-429-18475-1

1-283-59631-8

9786613908766

1-4398-8028-X

Edizione

[1st edition]

Descrizione fisica

1 online resource (556 p.)

Disciplina

005.8

Soggetti

Penetration testing (Computer security)

Computer networks - Security measures - Testing

Business enterprises - Data processing

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

An Auerbach book.

Nota di bibliografia

Includes bibliographical references.

Nota di contenuto

Cover; Title Page; Copyright; Contents; Foreword; Chapter 1: Getting Started; Chapter 2: Setting the Stage; Chapter 3: The Framework; Chapter 4: The Business Perspective; Chapter 5: Planning for a Controlled Attack; Chapter 6: Preparing for a Hack; Chapter 7: Reconnaissance; Chapter 8: Enumeration; Chapter 9: Vulnerability Analysis; Chapter 10: Exploitation; Chapter 11: The Deliverable; Chapter 12: Integrating the Results; Index

Sommario/riassunto

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains wh