Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally report security weaknesses using techniques such as SQL-injection, denial-of-service attacks, and password hacking.
Although From Hacking to Report Writing will give you the technical know-how needed to carry out advanced security tests, it also offers insight into crafting professional looking reports describing your work and how your customers can benefit from it. The book will give you the tools you need to clearly communicate the benefits of high-quality security and penetration testing to IT-management, executives and other stakeholders.
We live in a time where computer security is more important than ever. Staying one step ahead of hackers has never been a bigger challenge. From Hacking to Report Writing clarifies how you can sleep better at night knowing that your network has been thoroughly tested.
What you'll learn
Who This Book Is For
Aspiring security and penetration testers, security consultants, security and penetration testers, IT managers, andsecurity researchers.
Robert Svensson has had pretty much every IT job one can imagine: he's been yelled at over the phone taking support calls, he's done IT security incident management for multi-nationals, he's worked with startups, he's programmed and so on. but over the last ten years or so IT security has been his sole focus. In his case, that means he's done countless penetration tests, written numerous reports and somehow managed to get rehired to do it all over again. And yeah, he fell in love with computers the second he unwrapped the commodore 64 he got for Christmas about a million years ago-it all started there.
Chapter 1: Introduction.- Chapter 2: Security Testing Basics.- Chapter 3: The Security Testing Process.- Chapter 4: Technical Preparations.- Chapter 5: Security Test Execution.- Chapter 6: Identifying Vulnerabilities.- Chapter 7: Exploiting Vulnerabilities.- Chapter 8: Reporting Vulnerabilities.- Chapter 9: Example Reports.- Chapter 10: 10 Tips to Become a Better Security Tester.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.