logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits by James S. Tiller ISBN 9781439880272, 9781439880289, 1439880271, 143988028X

  • SKU: EBN-4747538
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

5.0

27 reviews
Instant download (eBook) CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits after payment.
Authors:James S. Tiller
Pages:389 pages.
Year:2011
Editon:Har/Chrt
Publisher:Auerbach Publications,CRC Press
Language:english
File Size:5.88 MB
Format:pdf
ISBNS:9781439880272, 9781439880289, 1439880271, 143988028X
Categories: Ebooks

Product desciption

(Ebook) CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits by James S. Tiller ISBN 9781439880272, 9781439880289, 1439880271, 143988028X

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used.From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of the testing life cycle. He describes how to set test expectations and how to identify a good test from a bad one. He introduces the business characteristics of testing, the imposed and inherent limitations, and describes how to deal with those limitations.The book outlines a framework for protecting confidential information and security professionals during testing. It covers social engineering and explains how to tune the plethora of options to best use this investigative tool within your own environment.Ideal for senior security management and anyone else responsible for ensuring a sound security posture, this reference depicts a wide range of possible attack scenarios. It illustrates the complete cycle of attack from the hacker’s perspective and presents a comprehensive framework to help you meet the objectives of penetration testing—including deliverables and the final report.
*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products