The book collects 3 years of researches in the penetration testing
security field. It does not describe underground or fancy
techniques, it is most focused on the state of the art in
penetration testing methodologies. In other words, if you need to
test a system, how do you do ? What is the first step ? What tools
can be used ? what is the path to follow in order to find flaws ?
The book shows many real world examples on how the described
methodology has been used. For example: penetration testing on
electronic voting machines, how malware did use the describe
methodology to bypass common security mechanisms and attacks to
reputation systems.
General
Is the information for this product incomplete, wrong or inappropriate?
Let us know about it.
Does this product have an incorrect or missing image?
Send us a new image.
Is this product missing categories?
Add more categories.
Review This Product
No reviews yet - be the first to create one!