A Design Methodology for Computer Security Testing
English

About The Book

The book collects 3 years of researches in the penetration testing security field. It does not describe underground or fancy techniques it is most focused on the state of the art in penetration testing methodologies. In other words if you need to test a system how do you do ? What is the first step ? What tools can be used ? what is the path to follow in order to find flaws ? The book shows many real world examples on how the described methodology has been used. For example: penetration testing on electronic voting machines how malware did use the describe methodology to bypass common security mechanisms and attacks to reputation systems.
Piracy-free
Piracy-free
Assured Quality
Assured Quality
Secure Transactions
Secure Transactions
Delivery Options
Please enter pincode to check delivery time.
*COD & Shipping Charges may apply on certain items.
Review final details at checkout.
downArrow

Details


LOOKING TO PLACE A BULK ORDER?CLICK HERE