02970oam 2200649I 450 991045790420332120200520144314.00-429-18475-11-283-59631-897866139087661-4398-8028-X10.1201/b11306 (CKB)2550000000074821(EBL)826967(OCoLC)772692279(SSID)ssj0000551068(PQKBManifestationID)11368245(PQKBTitleCode)TC0000551068(PQKBWorkID)10524681(PQKB)10914354(MiAaPQ)EBC826967(CaSebORM)9781439880289(Au-PeEL)EBL826967(CaPaEBR)ebr10518019(CaONFJC)MIL390876(EXLCZ)99255000000007482120180331d2012 uy 0engur|n|---|||||txtccrCISO's guide to penetration testing a framework to plan, manage, and maximize benefits /James S. Tiller1st editionBoca Raton, Fla. :CRC Press,2012.1 online resource (556 p.)An Auerbach book.1-4665-1684-4 1-4398-8027-1 Includes bibliographical references.Cover; Title Page; Copyright; Contents; Foreword; Chapter 1: Getting Started; Chapter 2: Setting the Stage; Chapter 3: The Framework; Chapter 4: The Business Perspective; Chapter 5: Planning for a Controlled Attack; Chapter 6: Preparing for a Hack; Chapter 7: Reconnaissance; Chapter 8: Enumeration; Chapter 9: Vulnerability Analysis; Chapter 10: Exploitation; Chapter 11: The Deliverable; Chapter 12: Integrating the Results; IndexCISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains whPenetration testing (Computer security)Computer networksSecurity measuresTestingBusiness enterprisesData processingElectronic books.Penetration testing (Computer security)Computer networksSecurity measuresTesting.Business enterprisesData processing.005.8Tiller James S.846921FlBoTFGFlBoTFGBOOK9910457904203321CISO's guide to penetration testing1892025UNINA