Commencez à lire BackTrack 4: Assuring Security by Penetration Testing sur votre Kindle dans moins d'une minute. Vous n'avez pas encore de Kindle ? Achetez-le ici Ou commencez à lire dès maintenant avec l'une de nos applications de lecture Kindle gratuites.

Envoyer sur votre Kindle ou un autre appareil


Essai gratuit

Découvrez gratuitement un extrait de ce titre

Envoyer sur votre Kindle ou un autre appareil

Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

BackTrack 4: Assuring Security by Penetration Testing [Format Kindle]

Shakeel Ali , Tedi Heriyanto

Prix conseillé : EUR 25,31 De quoi s'agit-il ?
Prix éditeur - format imprimé : EUR 41,13
Prix Kindle : EUR 17,72 TTC & envoi gratuit via réseau sans fil par Amazon Whispernet
Économisez : EUR 23,41 (57%)

App de lecture Kindle gratuite Tout le monde peut lire les livres Kindle, même sans un appareil Kindle, grâce à l'appli Kindle GRATUITE pour les smartphones, les tablettes et les ordinateurs.

Pour obtenir l'appli gratuite, saisissez votre adresse e-mail ou numéro de téléphone mobile.


Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 17,72  
Broché EUR 41,13  
-40%, -50%, -60%, -70%... Découvrez les Soldes Amazon jusqu'au 17 février 2015 inclus. Profitez-en !

Descriptions du produit

Présentation de l'éditeur

Written as an interactive tutorial, this book covers the core of BackTrack with real-world examples and step-by-step instructions to provide professional guidelines and recommendations to you. The book is designed in a simple and intuitive manner, which allows you to explore the whole BackTrack testing process or study parts of it individually. If you are an IT security professional or network administrator who has a basic knowledge of Unix/Linux operating systems including awareness of information security factors, and you want to use BackTrack for penetration testing, then this book is for you.

Biographie de l'auteur

Shakeel Ali is a main founder and CTO of Cipher Storm Ltd, UK. His expertise in the security industry markedly exceeds the standard number of security assessments, compliance, governance, and forensic projects that he carries in day-to-day operations. As a senior security evangelist and having spent endless nights without taking a nap, he provides constant security support to various businesses and government institutions globally. He is an active independent researcher who writes various articles, whitepapers, and manages a blog at He regularly participates in BugCon Security Conferences, Mexico, to highlight the best-of-breed cyber security threats and their solutions from practically driven countermeasures.

Tedi Heriyanto currently works as a Senior Technical Consultant in an Indonesian information technology company. He has worked with several well-known institutions in Indonesia and overseas, in designing secure network architecture, deploying and managing enterprise-wide security systems, developing information security policies and procedures, doing information security audit and assessment, and giving information security awareness training. In his spare times, he manages to research, write various articles, participate in Indonesian Security Community activities, and maintain a blog site. He has shared his knowledge in information security by writing several information security and computer programming books.

Détails sur le produit

  • Format : Format Kindle
  • Taille du fichier : 4994 KB
  • Nombre de pages de l'édition imprimée : 392 pages
  • Editeur : Packt Publishing (14 avril 2011)
  • Vendu par : Amazon Media EU S.à r.l.
  • Langue : Anglais
  • ASIN: B0056H9AAS
  • Synthèse vocale : Activée
  • X-Ray :
  • Word Wise: Non activé
  • Classement des meilleures ventes d'Amazon: n°446.383 dans la Boutique Kindle (Voir le Top 100 dans la Boutique Kindle)
  •  Souhaitez-vous faire modifier les images ?

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur (beta) 4.6 étoiles sur 5  58 commentaires
64 internautes sur 67 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 For people who want to know what it's like to be a pen tester 19 juin 2011
Par JAMES D MURRAY - Publié sur
This book is not just about learning a bunch of command line tools for p0wning a few poorly-maintained systems. In this book, the authors do a good job exposing the reader to the many facets of pen testing, and present the readers with the opportunity to try a few new things along the way, including virtualization, Linux, and BackTrack itself.

The authors introduce the idea that pen testing is not about randomly using a collection of tools to plink around a network. Instead, a structured, procedural methodology should be used to achieve timely, thorough, and reportable results. The author's also provide a detailed description of a security testing methodology to be used with BackTrack itself.

Each step in this methodology represents an element in the penetration testing life cycle management performed for each customer. The authors describe how this organized progression allows pen testers to determine their course of action, plan for needed resources, and not waste time and resources by duplicating effort. My only complaint is that this section is too small, and deserves expanding using actual case studies.

A considerable number of pen testing tools for each step in the methodology are covered with examples and instruction. Popular tools covered include Metasploit (Meterpreter), Maltego, NMap, NetXpose, and Nessus. Tools for exploiting (uh, testing) Web servers, databases, applications, and even Cisco devices are also covered.

I was very happy to see a chapter on Social Engineering. Experienced pen testers often remark that the most penetrable area of any system are the people who use and control it. The authors provide a detailed description of the psychology, tactics, and objectives of social engineering and how it is used to penetrate the "fleshy" parts of information systems.

This book is intended to educate both novice and experienced pen testers on how to successfully use BackTrack 4. I am sure not every professional pen testing will agree with everything in this book, as it represents the personal experience of only a few people in the profession. However, novices will find a tremendous amount of hands-on practice and enlightening information related to the pen testing profession in clear and readable instructions. Pros should a few things about becoming an even more efficient and versatile pen tester too.
44 internautes sur 45 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Good stuff! 11 juin 2011
Par L. Fesenden - Publié sur
Right after I got this book, Backtrack 5 was released. My intention was to go through the book and compare/contrast things to Backtrack 5. Well, we all know the saying about the best layed plans...
That being said, I believe the information in this book to be directly applicable to Backtrack 5 and a good reference for it!

The book is a great tutorial and walk-through on how to use Backtrack for security and penetration testing, but, more than that, it offers good information about the field in general. You will go through software installations, software overviews, methodologies, tests / testing, and my favorite part, reporting and deliverables, a MUST for professional computer people.

I think this is an excellent book to add to your knowledge arsenal and you may be surprised at just how much you didn't know. I know I was. This really is an important subject for computer professionals and I cant think of a better way to brush up than by grabbing a copy today. Thumbs up!
50 internautes sur 52 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Very Good For Backtrack Beginners 12 juin 2011
Par Mathew R Burnett - Publié sur
Format:Broché|Achat vérifié
This book was written very well for any BackTrack Beginners. Note going into this book though that BackTrack 5 is now available for free download. The chapters go over a lot of the tools, and you delve into Metasploit and some other Vulnerability Tools as well, though it sometimes seems rushed (which is why I am giving it a 4star instead of 5star rating). I think this book would have been amazing if it had a DVD with extra stuff, or even with the Backtrack ISO on it.

I would recommend this to anyone who doesn't know very much about BackTrack, or anyone who just wants a reference for it. This is also a great book for beginner Pen Testers.
53 internautes sur 56 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 BackTrack 4: Assuring Security by Penetration Testing 12 juillet 2011
Par Mat - Publié sur
I've always had an interest in BackTrack since version 4, however it seemed to be the one distribution that you couldn't find a recent (or decent) book for. There are a few out there, but both several versions old leaving tidbits and tutorials from assorted websites and youTube as the sole source of information on the distribution and the toolset contained within. I was fortunate to come across this book from Packt Publishing. BackTrack 4: Assuring Security Testing by Penetration Testing was the book I've been looking for.

This book did wonders for me. Not only did it begin talking about the process and procedures for for planning and mapping out your testing, but also goes in-depth detailing and demonstrating the tools following that process. Those are: Target Scoping, Information Gathering, Target Discovery, Enumerating Target, Vulnerability Mapping, Social Engineering, Target Exploitation, Privilege Escalation, and Maintaining Access.

I went through this book with the latest distribution, BackTrack 5. Although majority of the information was applicable, i still had to pop over to a BackTrack 4 virtual for some of the exercises. Overall, I found this book extremely useful and would definitely recommend it to anyone wanting to learn about penetration and network security or test their home defenses. While not a complete or definitive volume by any means, it is a great foundation for those wanting to start down the path of penetration testing.
43 internautes sur 45 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Very useful manual for security consultants 21 juillet 2011
Par D A Hutson - Publié sur
I am one of those security consultants who deal with number of Fortune 500 companies and government agencies. While engaging in security assessment and auditing projects, the book like "BackTrack 4: Assuring Security by Penetration Testing" values more than just a handful key to recall and play with number of pen-testing tools. It is a great resource for penetration testers as a reference manual. It has also highlighted all the basic and advanced features of how the pen-testing should be conducted logically. I wish the new version of this book should come out soon to reflect changes within Backtrack v5.
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Première publication:
Aller s'identifier

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon

Rechercher des articles similaires par rubrique