Penetration Testing For Dummies (notice n° 77302)
[ vue normale ]
000 -LEADER | |
---|---|
fixed length control field | 01878cam a2200277zu 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FRCYB88945276 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250108002001.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250108s2020 fr | o|||||0|0|||eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119577485 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | FRCYB88945276 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | FR-PaCSA |
Language of cataloging | en |
Transcribing agency | |
Description conventions | rda |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Shimonski, Robert |
245 01 - TITLE STATEMENT | |
Title | Penetration Testing For Dummies |
Statement of responsibility, etc. | ['Shimonski, Robert'] |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Name of producer, publisher, distributor, manufacturer | For Dummies |
Date of production, publication, distribution, manufacture, or copyright notice | 2020 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | p. |
336 ## - CONTENT TYPE | |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type code | c |
Source | rdamdedia |
338 ## - CARRIER TYPE | |
Carrier type code | c |
Source | rdacarrier |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Target, test, analyze, and report on security vulnerabilities with pen testing Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities. The different phases of a pen test from pre-engagement to completion Threat modeling and understanding risk When to apply vulnerability management vs penetration testing Ways to keep your pen testing skills sharp, relevant, and at the top of the game Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results! |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | |
700 0# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Shimonski, Robert |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Access method | Cyberlibris |
Uniform Resource Identifier | <a href="https://international.scholarvox.com/netsen/book/88945276">https://international.scholarvox.com/netsen/book/88945276</a> |
Electronic format type | text/html |
Host name |
Pas d'exemplaire disponible.
Réseaux sociaux