Description

Pen Testing from Contractto Report

Protect your system or web application with this accessible guide

Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application, averting potential user data breaches, privacy violations, losses of system function, and more. With system security an increasingly fundamental part of a connected world, it has never been more important that cyber professionals understand the pen test and its potential applications.

Pen Testing from Contract to Report offers a step-by-step overview of the subject. Built around a new concept called the Penetration Testing Life Cycle, it breaks the process into phases, guiding the reader through each phase and its potential to expose and address system vulnerabilities. The result is an essential tool in the ongoing fight against harmful system intrusions.

In Pen Testing from Contract to Report readers will also find:

  • Content mapped to certification exams such as the CompTIA PenTest+
  • Detailed techniques for evading intrusion detection systems, firewalls, honeypots, and more
  • Accompanying software designed to enable the reader to practice the concepts outlined, as well as end-of-chapter questions and case studies

Pen Testing from Contract to Report is ideal for any cyber security professional or advanced student of cyber security.

Pen Testing from Contract to Report

Product form

£74.95

Includes FREE delivery
Usually despatched within days
Hardback by Alfred Basta , Nadine Basta

1 in stock

Description:

Pen Testing from Contractto Report Protect your system or web application with this accessible guide Penetration tests, also known as... Read more

    Publisher: John Wiley & Sons Inc
    Publication Date: 07/02/2024
    ISBN13: 9781394176786, 978-1394176786
    ISBN10: 1394176783

    Number of Pages: 672

    Non Fiction , Computing

    Description

    Pen Testing from Contractto Report

    Protect your system or web application with this accessible guide

    Penetration tests, also known as ‘pen tests’, are a means of assessing the security of a computer system by simulating a cyber-attack. These tests can be an essential tool in detecting exploitable vulnerabilities in a computer system or web application, averting potential user data breaches, privacy violations, losses of system function, and more. With system security an increasingly fundamental part of a connected world, it has never been more important that cyber professionals understand the pen test and its potential applications.

    Pen Testing from Contract to Report offers a step-by-step overview of the subject. Built around a new concept called the Penetration Testing Life Cycle, it breaks the process into phases, guiding the reader through each phase and its potential to expose and address system vulnerabilities. The result is an essential tool in the ongoing fight against harmful system intrusions.

    In Pen Testing from Contract to Report readers will also find:

    • Content mapped to certification exams such as the CompTIA PenTest+
    • Detailed techniques for evading intrusion detection systems, firewalls, honeypots, and more
    • Accompanying software designed to enable the reader to practice the concepts outlined, as well as end-of-chapter questions and case studies

    Pen Testing from Contract to Report is ideal for any cyber security professional or advanced student of cyber security.

    Recently viewed products

    © 2024 Book Curl,

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account