Politeknik Siber dan Sandi Negara

Knowledge Center of Cybersecurity and Cryptography

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
Image of Penetration testing: a hands-on guide for beginners
Bookmark Share

Text

Penetration testing: a hands-on guide for beginners

Wallace, Connor - Personal Name;

This book will help you in Learning the Basics of Penetration Testing. It will cover the main features of Penetration Testing and will help you better understand the flaws in a network system and how to resolve them. It has been designed in such a way that it does not require any prior experience of testing or hacking. It will cover all the details completely from start to end.
You will learn the objectives of Penetrating Testing, steps to conduct a pen test, elements, and phases of Penetrating Testing. The book also covers the techniques used in Penetration Testing and how to test the standard security protocols in network systems.
This book guides you on how to use vulnerability assessment, types of security breaches, and the role of Penetrating Testing in enterprises. You will also learn how to keep your systems safe and secure.
You will learn about the top ten security risks and how to fix them using Penetration Testing. You will learn how to use Penetration tools like Nmap, Burp Suite Intruder, IBM Appscan, HP Webinspect, and Hack Bar.
Once you finish reading the book, you will be ready to make your own pen tests and tackle the advanced topics related to Penetration Testing. This book will guide you step by step in a structured and efficient manner so that you can fully utilize it in your practical experience. It is an excellent book for those who want to learn Penetration Testing but don’t know where or how to start.

Table of contents
Chapter 1: Penetration testing strategies
Chapter 2: Techniques used in penetration testing
Chapter 3: Penetration testing approach
Chapter 4: Top ten security risks and fixes using penetration
Chapter 5: Web authorization attacks
Chapter 6: Database security by preventing SQL injection attacks
Chapter 7: Tools for penetration testing
Chapter 8: Owasp top ten
Chapter 9: Mobile application security testing


Availability
#
Perpustakaan Poltek SSN (Rak 000) 005.8 WAL p
b0003301
Available
Detail Information
Series Title
--
Call Number
005.8 WAL p
Publisher
USA : Independently published., 2020
Collation
viii, 185 hlm.; ilus.; 23 cm
Language
English
ISBN/ISSN
9798614981143
Classification
005.8
Content Type
-
Media Type
-
Carrier Type
-
Edition
--
Subject(s)
Penetration testing (Computer security)
Specific Detail Info
--
Statement of Responsibility
Connor Wallace
Other Information
Link
-
Daftar Isi
-
Other version/related

No other version available

File Attachment
No Data
Comments

You must be logged in to post a comment

Politeknik Siber dan Sandi Negara
  • Information
  • Services
  • Librarian
  • Member Area

About Us

Perpustakaan Politeknik Siber dan Sandi Negara menyediakan berbagai macam koleksi seperti Buku, Jurnal, Majalah, Koran, Referensi dan Konten Lokal.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2025 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search
Where do you want to share?