Kali Linux - Assuring Security by Penetration Testing et plus d'un million d'autres livres sont disponibles pour le Kindle d'Amazon. En savoir plus


ou
Identifiez-vous pour activer la commande 1-Click.
Amazon Rachète votre article
Recevez un chèque-cadeau de EUR 10,94
Amazon Rachète cet article
Plus de choix
Vous l'avez déjà ? Vendez votre exemplaire ici
Désolé, cet article n'est pas disponible en
Image non disponible pour la
couleur :
Image non disponible

 
Commencez à lire Kali Linux - Assuring Security by Penetration Testing sur votre Kindle en moins d'une minute.

Vous n'avez pas encore de Kindle ? Achetez-le ici ou téléchargez une application de lecture gratuite.

Kali Linux – Assuring Security by Penetration Testing [Anglais] [Broché]

Shakeel Ali , Tedi Heriyanto , T. Allen

Prix : EUR 35,33 Livraison à EUR 0,01 En savoir plus.
  Tous les prix incluent la TVA
o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o o
En stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Voulez-vous le faire livrer le mardi 23 septembre ? Choisissez la livraison en 1 jour ouvré sur votre bon de commande. En savoir plus.

Formats

Prix Amazon Neuf à partir de Occasion à partir de
Format Kindle EUR 14,41  
Broché EUR 35,33  
Vendez cet article - Prix de rachat jusqu'à EUR 10,94
Vendez Kali Linux – Assuring Security by Penetration Testing contre un chèque-cadeau d'une valeur pouvant aller jusqu'à EUR 10,94, que vous pourrez ensuite utiliser sur tout le site Amazon.fr. Les valeurs de rachat peuvent varier (voir les critères d'éligibilité des produits). En savoir plus sur notre programme de reprise Amazon Rachète.

Description de l'ouvrage

7 avril 2014

Master the art of penetration testing with Kali Linux

Overview

  • Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution
  • Explore the insights and importance of testing your corporate network systems before the hackers strike
  • Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits

In Detail

Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.

Kali Linux - Assuring Security By Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. This book offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today’s digital age.

Starting with lab preparation and testing procedures that explain the basic installation and configuration set up, this guide then focuses on discussing types of penetration testing (black-box and white-box), uncovering open security testing methodologies, and proposing the Kali Linux specific testing process. A number of security assessment tools are discussed, including those necessary to conduct penetration testing in their respective categories, following the formal testing methodology. Each of these tools have been annotated with real-world examples in context of highlighting their practical usage and proven configuration techniques. Extra weaponry treasure is also provided, and key resources that may be crucial to any professional penetration tester are cited in this book.

What you will learn from this book

  • Develop the Kali Linux environment in your test lab by installing, configuring, running, and updating its core system components
  • Draw a formal Kali Linux testing methodology
  • Scope your target with definitive test requirements, limitations, business objectives, and schedule the test plan
  • Practically exercise a number of security tools from Kali Linux, logically divided into sub-categories of testing methodology
  • Practice the processes of reconnaissance, discovery, enumeration, vulnerability mapping, social engineering, exploitation, privilege escalation, and maintaining access to target for evaluation purposes
  • Document, report, and present your verified test results to the relevant authorities in a formal reporting structure
  • Assess your target information system's environment built with various technologies, such as web applications, network administration servers, workstations, Cisco devices, firewalls, load balancers, routers, switches, intrusion detection and prevention devices, and many more
  • Examine and research the vulnerability in a greater detail before attempting to exploit it
  • Exploit human vulnerability by wrapping yourself with an art of deception to acquire the target

Offres spéciales et liens associés



Descriptions du produit

Biographie de l'auteur

Tedi Heriyanto

Tedi Heriyanto currently works as a principal consultant in an Indonesian information security company. In his current role, he has been engaged with various penetration testing assignments in Indonesia and other countries. In his previous role, he was engaged with several well-known business institutions across Indonesia and overseas. Tedi has an excellent track record in designing secure network architecture, deploying and managing enterprise-wide security systems, developing information security policies and procedures, performing information security audits and assessments, and providing information security awareness training. In his spare time, he manages to research, learn, and participate in the Indonesian Security Community activities and has a blog http://theriyanto.wordpress.com. He shares his knowledge in the security field by writing several information security books.



Lee Allen

Lee Allen is currently working as a security architect at a prominent university. Throughout the years, he has continued his attempts to remain up to date with the latest and greatest developments in the security industry and the security community. He has several industry certifications including the OSWP and has been working in the IT industry for over 15 years.

Lee Allen is the author of Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide, Packt Publishing.



Shakeel Ali

Shakeel Ali is a Security and Risk Management consultant at Fortune 500. Previously, he was the key founder of Cipher Storm Ltd., UK. His expertise in the security industry markedly exceeds the standard number of security assessments, audits, compliance, governance, and forensic projects that he carries out in day-to-day operations. He has also served as a Chief Security Officer at CSS Providers SAL. As a senior security evangelist and having spent endless nights without taking a nap, he provides constant security support to various businesses, educational organizations, and government institutions globally. He is an active, independent researcher who writes various articles and whitepapers and manages a blog at Ethical-Hacker.net. Also, he regularly participates in BugCon Security Conferences held in Mexico, to highlight the best-of-breed cyber security threats and their solutions from practically driven countermeasures.


Détails sur le produit


En savoir plus sur les auteurs

Découvrez des livres, informez-vous sur les écrivains, lisez des blogs d'auteurs et bien plus encore.

Commentaires en ligne 

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoiles
Commentaires client les plus utiles sur Amazon.com (beta)
Amazon.com: 3.9 étoiles sur 5  7 commentaires
1 internautes sur 1 ont trouvé ce commentaire utile 
5.0 étoiles sur 5 Provides quality contents and exceptionally clear and realistic examples for Penetration Testing 12 juillet 2014
Par Kenneth Mongan Jr - Publié sur Amazon.com
Format:Format Kindle
The overall contents of the book are quite useful and informative. I work in one of the top financial institutions (Fortune 100) where the security practices require proactive and diligent measures to be taken for all the possible threat scenarios. This is where the Penetration Testing comes in handy. It is, however, not so common in my industry to utilize open source security auditing tools to assess the threats and vulnerabilities which may exist in the network infrastructure (systems or applications). But leveraging a use of Open Source Security Toolkit (i.e. Kali Linux) in parallel provides more flexible and robust structure for conducting the pen-testing exercise. As the combination of both Open Source and Commercial security tools help in broad coverage of vulnerability intelligence. Therefore, it assures that you will not miss any major security issues which may have been existed and yet to be discovered by malicious adversary in near future. The book provides a comprehensive guidelines on the pen-testing methodology and each of its sub-process has been written in clear and concise format divided into individual chapters. The book has distinguished itself from the rest based on several factors, such as the quality of the contents, exceptionally clear and realistic examples, and theoretical explanations behind each concept in the security field.
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Great Book 7 juillet 2014
Par Naz Hus - Publié sur Amazon.com
Format:Broché
A great introductory practical tutorial. Provides valuable information with good amount of detail on using Kali for security and penetration tests. One of the greatest benefits of using Kali is the packages of tools which comes with it. This book does a good job on covering topics like exploitation and security vulnerabilities using tools like Metasploit. Additionally covers number of other tools and their uses such as: Wireshark, Nessus and Nmap. Overall a solid book with good flow and good selection topics. Only critique (personal) I would say that the book is a hefty size and really gets useful after chapter 4, it is quite broad and takes an introductory approach, but it had potential to explore concepts in more depth and cover the real difficulties in this field, but for an introductory useful reference to security and penetration tests, this book is a great place to start.
1 internautes sur 1 ont trouvé ce commentaire utile 
4.0 étoiles sur 5 Kali Linux - Assuring Security by Penetration Testing 7 juillet 2014
Par Mat - Publié sur Amazon.com
Format:Format Kindle
Had some time over the holiday to finish my review copy of Kali Linux – Assuring Security by Penetration Testing, which is Ppobably one of the better beginner/intermediate Kali books.

This book covers a lot of ground and lays down a solid foundation for discovery, enumeration, vulnerability assessment, exploitation, persistence, and reporting. It covers a lot of the basic tools like nmap, wireshark, metasploit, openvas,and burp as well as going into some of the fuzzers, MITM attacks, escalation and more.

The only thing that would make this book perfect is if the author got rid of the first two chapters (downloading,installing,configuring, etc) and condensed the chapters on penetration testing methodologies and reporting together.
4.0 étoiles sur 5 Assuring Security By Penetration Testing” by Packt Publishing – the book provides a good overview on Kali Penetration Testing su 1 août 2014
Par Yuval Sinay - Publié sur Amazon.com
Format:Broché
"Kali Linux: Assuring Security By Penetration Testing” by Packt Publishing – the book provides a good overview on Kali Penetration Testing suite features (including a basic lab) and a basic review of the common Penetration Testing methodologies. In addition, Packt Publishing has a solid background in authoring security books on Kali suite, like the book “Web Penetration Testing with Kali Linux”. Furthermore, the book is easy to read and it’s a book that can be read in a short time.
The main limitations that I found in this book are: The book covers information which isn’t update to date sometimes (e.g. SMB and CIFS today aren’t the same protocols, etc). The other limitation is the hard copy book price and I hope that book price would be dropped in the near future.
As a final word, the book can be used by beginners that like to become familiar with Kali Penetration Testing suite.
Disclosure - I got a free copy of the book from Packt Publishing for reviewing purpose.
The book page link, http://goo.gl/TQ80h3
3.0 étoiles sur 5 Nice intro and provides some basics on installation 7 juillet 2014
Par alshttrbg - Publié sur Amazon.com
Format:Format Kindle|Achat vérifié
Nice intro and provides some basics on installation. Fairly okay in terms of very general information. You could stand to learn more on the Kali.org website. The manual provides decent information on downloading, installation by means of USB, disk or by using a virtual machine. Other than that, it earns a 3 star rating for what is well provided. Beyond that, it spends way too much time on explaining the writer and their backgrounds!
Ces commentaires ont-ils été utiles ?   Dites-le-nous

Discussions entre clients

Le forum concernant ce produit
Discussion Réponses Message le plus récent
Pas de discussions pour l'instant

Posez des questions, partagez votre opinion, gagnez en compréhension
Démarrer une nouvelle discussion
Thème:
Première publication:
Aller s'identifier
 

Rechercher parmi les discussions des clients
Rechercher dans toutes les discussions Amazon
   


Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?