Abbildung von: From Hacking to Report Writing - Apress

From Hacking to Report Writing

An Introduction to Security and Penetration Testing
Robert Svensson(Autor*in)
Apress
Erschienen am 4. November 2016
XXII, 190 Seiten
E-Book
PDF mit Wasserzeichen-DRM
978-1-4842-2283-6 (ISBN)
56,99 €inkl. 7% MwSt.
Systemvoraussetzungen
für PDF mit Wasserzeichen-DRM
E-Book Einzellizenz
Als Download verfügbar

Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally report security weaknesses using techniques such as SQL-injection, denial-of-service attacks, and password hacking.

Although From Hacking to Report Writing will give you the technical know-how needed to carry out advanced security tests, it also offers insight into crafting professional looking reports describing your work and how your customers can benefit from it. The book will give you the tools you need to clearly communicate the benefits of high-quality security and penetration testing to IT-management, executives and other stakeholders.

Embedded in the book are a number of on-the-job stories that will give you a good understanding of how you can apply what you have learned to real-world situations.

We live in a time where computer security is more important than ever. Staying one step ahead of hackers has never been a bigger challenge. From Hacking to Report Writing clarifies how you can sleep better at night knowing that your network has been thoroughly tested.

What you'll learn

  • Clearly understand why security and penetration testing is important
  • Find vulnerabilities in any system using the same techniques as hackers do
  • Write professional looking reports
  • Know which security and penetration testing method to apply for any given situation
  • Successfully hold together a security and penetration test project

Who This Book Is For

Aspiring security and penetration testers, security consultants, security and penetration testers, IT managers, and security researchers.

Auflage
1st ed.
Sprache
Englisch
Verlagsort
CA
USA
Verlagsgruppe
APRESS
Illustrationen
26
53 farbige Abbildungen, 26 s/w Abbildungen
XXII, 190 p. 79 illus., 53 illus. in color.
Dateigröße
12,74 MB
ISBN-13
978-1-4842-2283-6 (9781484222836)
DOI
10.1007/978-1-4842-2283-6
Schlagworte
Schweitzer Klassifikation
Thema Klassifikation
DNB DDC Sachgruppen
Dewey Decimal Classfication (DDC)
BIC 2 Klassifikation
BISAC Klassifikation
Warengruppensystematik 2.0

Robert Svensson has had pretty much every IT job one can imagine: he's been yelled at over the phone taking support calls, he's done IT security incident management for multi-nationals, he's worked with startups, he's programmed and so on. but over the last ten years or so IT security has been his sole focus. In his case, that means he's done countless penetration tests, written numerous reports and somehow managed to get rehired to do it all over again. And yeah, he fell in love with computers the second he unwrapped the commodore 64 he got for Christmas about a million years ago-it all started there.

One of Robert's goals in writing this book is to put out the book he wish he had read when he first started doing penetration tests-a book that also clearly explains why security testing is important, not just how it's done. However, the number one reason why he's writing this book is simple: passion. He loves security and learning as much about it as he possibly can. And having worked as a teacher, he knows no better way to learn than to teach.

Chapter 1: Introduction.- Chapter 2: Security Testing Basics.- Chapter 3: The Security Testing Process.- Chapter 4: Technical Preparations.- Chapter 5: Security Test Execution.- Chapter 6: Identifying Vulnerabilities.- Chapter 7: Exploiting Vulnerabilities.- Chapter 8: Reporting Vulnerabilities.- Chapter 9: Example Reports.- Chapter 10: 10 Tips to Become a Better Security Tester.

Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)

Systemvoraussetzungen:

  • Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).
  • Tablet/Smartphone (Android; iOS): Installieren Sie bereits vor dem Download die kostenlose App Adobe Digital Editions oder die App PocketBook (siehe E-Book Hilfe).
  • E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.

Weitere Informationen finden Sie in unserer  E-Book Hilfe.