Ebook The ethical hack - A framework for business value penetration testing

Ebook "The ethical hack - A framework for business value penetration testing" includes content: Getting started, setting the stage, the framework, information security models, information security program, the business perspective, planning for a controlled attack, preparing for a hack, enumeration, vulnerability analysis, exploitation, the deliverable, integrating the results. | The Ethical Hack A Framework for Business Value Penetration Testing OTHER INFORMATION SECURITY BOOKS FROM AUERBACH Asset Protection and Security Management Information Technology Control and Audit Handbook Fredrick Gallegos Daniel Manson POA Publishing and Sandra Allen-Senft ISBN 0-8493-1603-0 ISBN 0-8493-9994-7 Building a Global Information Assurance Investigator s Guide to Steganography Program Gregory Kipper Raymond J. Curts and Douglas E. Campbell 0-8493-2433-5 ISBN 0-8493-1368-6 Managing a Network Vulnerability Assessment Building an Information Security Awareness Thomas Peltier Justin Peltier and John A. Blackley Program ISBN 0-8493-1270-1 Mark B. Desman Network Perimeter Security Building Defense ISBN 0-8493-0116-5 In-Depth Critical Incident Management Cliff Riggs Alan B. Sterneckert ISBN 0-8493-1628-6 ISBN 0-8493-0010-X The Practical Guide to HIPAA Privacy and Cyber Crime Investigator s Field Guide Security Compliance Bruce Middleton Kevin Beaver and Rebecca Herold ISBN 0-8493-1192-6 ISBN 0-8493-1953-6 Cyber Forensics A Field Manual for Collecting A Practical Guide to Security Engineering and Examining and Preserving Evidence of Information Assurance Computer Crimes Debra S. Herrmann Albert J. Marcella Jr. and Robert S. Greenfield ISBN 0-8493-1163-2 ISBN 0-8493-0955-7 The Privacy Papers Managing Technology The Ethical Hack A Framework for Business Consumer Employee and Legislative Actions Value Penetration Testing Rebecca Herold James S. Tiller ISBN 0-8493-1248-5 ISBN 0-8493-1609-X Public Key Infrastructure Building Trusted The Hacker s Handbook The Strategy Behind Applications and Web Services Breaking into and Defending Networks John R. Vacca Susan Young and Dave Aitel ISBN 0-8493-0822-4 ISBN 0-8493-0888-7 Securing and Controlling Cisco Routers Information Security Architecture Peter T. Davis An Integrated Approach to Security in the ISBN 0-8493-1290-6 Organization Strategic Information Security Jan Killmeyer Tudor John Wylder ISBN 0-8493-9988-2 ISBN .

Không thể tạo bản xem trước, hãy bấm tải xuống
TÀI LIỆU MỚI ĐĂNG
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.