LEADER 02970oam 2200649I 450 001 9910457904203321 005 20200520144314.0 010 $a0-429-18475-1 010 $a1-283-59631-8 010 $a9786613908766 010 $a1-4398-8028-X 024 7 $a10.1201/b11306 035 $a(CKB)2550000000074821 035 $a(EBL)826967 035 $a(OCoLC)772692279 035 $a(SSID)ssj0000551068 035 $a(PQKBManifestationID)11368245 035 $a(PQKBTitleCode)TC0000551068 035 $a(PQKBWorkID)10524681 035 $a(PQKB)10914354 035 $a(MiAaPQ)EBC826967 035 $a(CaSebORM)9781439880289 035 $a(Au-PeEL)EBL826967 035 $a(CaPaEBR)ebr10518019 035 $a(CaONFJC)MIL390876 035 $a(EXLCZ)992550000000074821 100 $a20180331d2012 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aCISO's guide to penetration testing $ea framework to plan, manage, and maximize benefits /$fJames S. Tiller 205 $a1st edition 210 1$aBoca Raton, Fla. :$cCRC Press,$d2012. 215 $a1 online resource (556 p.) 300 $aAn Auerbach book. 311 $a1-4665-1684-4 311 $a1-4398-8027-1 320 $aIncludes bibliographical references. 327 $aCover; Title Page; Copyright; Contents; Foreword; Chapter 1: Getting Started; Chapter 2: Setting the Stage; Chapter 3: The Framework; Chapter 4: The Business Perspective; Chapter 5: Planning for a Controlled Attack; Chapter 6: Preparing for a Hack; Chapter 7: Reconnaissance; Chapter 8: Enumeration; Chapter 9: Vulnerability Analysis; Chapter 10: Exploitation; Chapter 11: The Deliverable; Chapter 12: Integrating the Results; Index 330 $aCISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains wh 606 $aPenetration testing (Computer security) 606 $aComputer networks$xSecurity measures$xTesting 606 $aBusiness enterprises$xData processing 608 $aElectronic books. 615 0$aPenetration testing (Computer security) 615 0$aComputer networks$xSecurity measures$xTesting. 615 0$aBusiness enterprises$xData processing. 676 $a005.8 700 $aTiller$b James S.$0846921 801 0$bFlBoTFG 801 1$bFlBoTFG 906 $aBOOK 912 $a9910457904203321 996 $aCISO's guide to penetration testing$91892025 997 $aUNINA