02618nam 22005175 450 991025474930332120200706232336.01-4842-1857-410.1007/978-1-4842-1857-0(CKB)3710000000765484(DE-He213)978-1-4842-1857-0(MiAaPQ)EBC4603744(PPN)194517357(EXLCZ)99371000000076548420160714d2016 u| 0engurnn|008mamaatxtrdacontentcrdamediacrrdacarrierPenetration Testing Basics[electronic resource] A Quick-Start Guide to Breaking into Systems /by Ric Messier1st ed. 2016.Berkeley, CA :Apress :Imprint: Apress,2016.1 online resource (XV, 114 p. 41 illus., 34 illus. in color.) Includes index.1-4842-1856-6 1. What Is Penetration Testing? -- 2. Digging for Information -- 3. What’s Open? -- 4. Vulnerabilities -- 5. Exploitation -- 6. Breaking Web Sites -- 7. Reporting.Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. Penetration Testing Basics explains: How to identify security vulnerabilities How to use some of the top security tools in order to identify holes How to read reports from testing tools Common vulnerability types and attacks Common Web-based attacks and exposures as well as recommendations for closing those holes.Data protectionComputer programmingSoftware engineeringSecurityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28000Programming Techniqueshttps://scigraph.springernature.com/ontologies/product-market-codes/I14010Software Engineeringhttps://scigraph.springernature.com/ontologies/product-market-codes/I14029Data protection.Computer programming.Software engineering.Security.Programming Techniques.Software Engineering.005.11Messier Ricauthttp://id.loc.gov/vocabulary/relators/aut861748BOOK9910254749303321Penetration Testing Basics1923090UNINA