• Tous les prix incluent la TVA.
En stock.
Expédié et vendu par Amazon. Emballage cadeau disponible.
Quantité :1
BackTrack 4: Assuring Sec... a été ajouté à votre Panier
+ EUR 2,99 (livraison)
D'occasion: Très bon | Détails
Vendu par momox fr
État: D'occasion: Très bon
Commentaire: En Stock.
Vous l'avez déjà ?
Repliez vers l'arrière Repliez vers l'avant
Ecoutez Lecture en cours... Interrompu   Vous écoutez un extrait de l'édition audio Audible
En savoir plus
Voir les 2 images

BackTrack 4: Assuring Security by Penetration Testing (Anglais) Broché – 14 avril 2011


Voir les formats et éditions Masquer les autres formats et éditions
Prix Amazon
Neuf à partir de Occasion à partir de
Format Kindle
"Veuillez réessayer"
Broché
"Veuillez réessayer"
EUR 41,13
EUR 41,13 EUR 4,81
Note: Cet article est éligible à la livraison en points de collecte. Détails
Récupérer votre colis où vous voulez quand vous voulez.
  • Choisissez parmi 17 000 points de collecte en France
  • Les membres du programme Amazon Premium bénéficient de livraison gratuites illimitées
Comment commander vers un point de collecte ?
  1. Trouvez votre point de collecte et ajoutez-le à votre carnet d’adresses
  2. Sélectionnez cette adresse lors de votre commande
Plus d’informations

Il y a une édition plus récente de cet article:

click to open popover

Offres spéciales et liens associés


Descriptions du produit

Présentation de l'éditeur

Master the art of penetration testing with BackTrack Learn the black-art of penetration testing with in-depth coverage of BackTrack Linux distribution Explore the insights and importance of testing your corporate network systems before hackers strike it Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits Fully illustrated with practical examples, step-by-step instructions, and useful tips to cover the best-of-breed security assessment tools In Detail BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your network. BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step strategy. It offers all the essential lab preparation and testing procedures to reflect real-world attack scenarios from your business perspective in today's digital age. The authors' experience and expertise enables them to reveal the industry's best approach for logical and systematic penetration testing. The first and so far only book on BackTrack OS starts with lab preparation and testing procedures, explaining the basic installation and configuration set up, discussing types of penetration testing (black-box and white-box), uncovering open security testing methodologies, and proposing the BackTrack specific testing process. The authors discuss a number of security assessment tools necessary to conduct penetration testing in their respective categories (target scoping, information gathering, discovery, enumeration, vulnerability mapp

Biographie de l'auteur

Shakeel Ali is a main founder and CTO of Cipher Storm Ltd, UK. His expertise in the security industry markedly exceeds the standard number of security assessments, compliance, governance, and forensic projects that he carries in day-to-day operations. As a senior security evangelist and having spent endless nights without taking a nap, he provides constant security support to various businesses and government institutions globally. He is an active independent researcher who writes various articles, whitepapers, and manages a blog at Ethical-Hacker.net. He regularly participates in BugCon Security Conferences, Mexico, to highlight the best-of-breed cyber security threats and their solutions from practically driven countermeasures.

Aucun appareil Kindle n'est requis. Téléchargez l'une des applis Kindle gratuites et commencez à lire les livres Kindle sur votre smartphone, tablette ou ordinateur.

  • Apple
  • Android
  • Windows Phone
  • Android

Pour obtenir l'appli gratuite, saisissez votre ou numéro de téléphone mobile.




Détails sur le produit

Commentaires en ligne

Il n'y a pas encore de commentaires clients sur Amazon.fr
5 étoiles
4 étoiles
3 étoiles
2 étoiles
1 étoile

Commentaires client les plus utiles sur Amazon.com (beta)

Amazon.com: HASH(0x9741c42c) étoiles sur 5 58 commentaires
64 internautes sur 67 ont trouvé ce commentaire utile 
HASH(0x97a388e8) étoiles sur 5 For people who want to know what it's like to be a pen tester 19 juin 2011
Par JAMES D MURRAY - Publié sur Amazon.com
Format: Broché
This book is not just about learning a bunch of command line tools for p0wning a few poorly-maintained systems. In this book, the authors do a good job exposing the reader to the many facets of pen testing, and present the readers with the opportunity to try a few new things along the way, including virtualization, Linux, and BackTrack itself.

The authors introduce the idea that pen testing is not about randomly using a collection of tools to plink around a network. Instead, a structured, procedural methodology should be used to achieve timely, thorough, and reportable results. The author's also provide a detailed description of a security testing methodology to be used with BackTrack itself.

Each step in this methodology represents an element in the penetration testing life cycle management performed for each customer. The authors describe how this organized progression allows pen testers to determine their course of action, plan for needed resources, and not waste time and resources by duplicating effort. My only complaint is that this section is too small, and deserves expanding using actual case studies.

A considerable number of pen testing tools for each step in the methodology are covered with examples and instruction. Popular tools covered include Metasploit (Meterpreter), Maltego, NMap, NetXpose, and Nessus. Tools for exploiting (uh, testing) Web servers, databases, applications, and even Cisco devices are also covered.

I was very happy to see a chapter on Social Engineering. Experienced pen testers often remark that the most penetrable area of any system are the people who use and control it. The authors provide a detailed description of the psychology, tactics, and objectives of social engineering and how it is used to penetrate the "fleshy" parts of information systems.

This book is intended to educate both novice and experienced pen testers on how to successfully use BackTrack 4. I am sure not every professional pen testing will agree with everything in this book, as it represents the personal experience of only a few people in the profession. However, novices will find a tremendous amount of hands-on practice and enlightening information related to the pen testing profession in clear and readable instructions. Pros should a few things about becoming an even more efficient and versatile pen tester too.
44 internautes sur 45 ont trouvé ce commentaire utile 
HASH(0x9856fe28) étoiles sur 5 Good stuff! 11 juin 2011
Par L. Fesenden - Publié sur Amazon.com
Format: Broché
Right after I got this book, Backtrack 5 was released. My intention was to go through the book and compare/contrast things to Backtrack 5. Well, we all know the saying about the best layed plans...
That being said, I believe the information in this book to be directly applicable to Backtrack 5 and a good reference for it!

The book is a great tutorial and walk-through on how to use Backtrack for security and penetration testing, but, more than that, it offers good information about the field in general. You will go through software installations, software overviews, methodologies, tests / testing, and my favorite part, reporting and deliverables, a MUST for professional computer people.

I think this is an excellent book to add to your knowledge arsenal and you may be surprised at just how much you didn't know. I know I was. This really is an important subject for computer professionals and I cant think of a better way to brush up than by grabbing a copy today. Thumbs up!
50 internautes sur 52 ont trouvé ce commentaire utile 
HASH(0x97a38060) étoiles sur 5 Very Good For Backtrack Beginners 12 juin 2011
Par Mathew R Burnett - Publié sur Amazon.com
Format: Broché Achat vérifié
This book was written very well for any BackTrack Beginners. Note going into this book though that BackTrack 5 is now available for free download. The chapters go over a lot of the tools, and you delve into Metasploit and some other Vulnerability Tools as well, though it sometimes seems rushed (which is why I am giving it a 4star instead of 5star rating). I think this book would have been amazing if it had a DVD with extra stuff, or even with the Backtrack ISO on it.

I would recommend this to anyone who doesn't know very much about BackTrack, or anyone who just wants a reference for it. This is also a great book for beginner Pen Testers.
53 internautes sur 56 ont trouvé ce commentaire utile 
HASH(0x9856f8ac) étoiles sur 5 BackTrack 4: Assuring Security by Penetration Testing 12 juillet 2011
Par Mat - Publié sur Amazon.com
Format: Broché
I've always had an interest in BackTrack since version 4, however it seemed to be the one distribution that you couldn't find a recent (or decent) book for. There are a few out there, but both several versions old leaving tidbits and tutorials from assorted websites and youTube as the sole source of information on the distribution and the toolset contained within. I was fortunate to come across this book from Packt Publishing. BackTrack 4: Assuring Security Testing by Penetration Testing was the book I've been looking for.

This book did wonders for me. Not only did it begin talking about the process and procedures for for planning and mapping out your testing, but also goes in-depth detailing and demonstrating the tools following that process. Those are: Target Scoping, Information Gathering, Target Discovery, Enumerating Target, Vulnerability Mapping, Social Engineering, Target Exploitation, Privilege Escalation, and Maintaining Access.

I went through this book with the latest distribution, BackTrack 5. Although majority of the information was applicable, i still had to pop over to a BackTrack 4 virtual for some of the exercises. Overall, I found this book extremely useful and would definitely recommend it to anyone wanting to learn about penetration and network security or test their home defenses. While not a complete or definitive volume by any means, it is a great foundation for those wanting to start down the path of penetration testing.
49 internautes sur 52 ont trouvé ce commentaire utile 
HASH(0x97a38db0) étoiles sur 5 BlackHat underground exposed 13 juillet 2011
Par mr.sk - Publié sur Amazon.com
Format: Broché
Whenever someone asks me about computer security, I try to differentiate between two concepts defensive security (Cisco, McAfee, Checkpoint, Policies, Procedures, Rules, etc) and offensive security (Pen-testing, ethical hacking, etc). This book is an absolute guide for IT & network professionals who wish to explore the offensive security world. Especially those who have prior knowledge and experience with information security concepts or hold basic certification like Security + or CISSP. Today, many penetration testing courses offer the insights of offensive security through BackTrack operating system, not just because it is a hacking platform but it also leverages the process of penetration testing in a systematic order. The book begins with a brief history, description, installation and configuration of BackTrack 4. It also explains how to handle various types of installations (Virtualization, HDD, USB), and how to start-up and running your own BackTrack 4 copy in just few steps.

Reading through the initial chapters you will encounter the core pen-testing concepts and descriptions of various assessment methodologies. They are explained very clearly and precisely as a whole. You will also find explanations of best security assessment tools, their options usage and results interpretation, and pen-testing project management and reporting guidelines. What I most like about this book is that the tools are well-organized in penetration testing methodology shown with practical examples and best yet, compatible with BackTrack 5 too. I hope the authors will take out an update of this book for BackTrack 5 soon. It is a great addition to my information warfare arsenal.
Ces commentaires ont-ils été utiles ? Dites-le-nous

Rechercher des articles similaires par rubrique


Commentaires

Souhaitez-vous compléter ou améliorer les informations sur ce produit ? Ou faire modifier les images?