Marknadens största urval
Snabb leverans

Böcker av James S. Tiller

Filter
Filter
Sortera efterSortera Populära
  • - A Framework for Business Value Penetration Testing
    av James S. Tiller
    890 - 1 630,-

    Explains the methodologies, framework, and 'unwritten conventions' that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required for successful tests.

  • av James S. Tiller
    900,-

    Provides an approach to managing people, process, and technology through the sound application of metrics. This book demonstrates how to develop a strategy for meeting security challenges and enhancing the business in addressing threats and compliance.

  • - A Framework to Plan, Manage, and Maximize Benefits
    av James S. Tiller
    860,-

    CISO''s Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of the testing life cycle. He describes how to set test expectations and how to identify a good test from a bad one. He introduces the business characteristics of testing, the imposed and inherent limitations, and describes how to deal with those limitations. The book outlines a framework for protecting confidential information and security professionals during testing. It covers social engineering and explains how to tune the plethora of options to best use this investigative tool within your own environment. Ideal for senior security management and anyone else responsible for ensuring a sound security posture, this reference depicts a wide range of possible attack scenarios. It illustrates the complete cycle of attack from the hackerΓÇÖs perspective and presents a comprehensive framework to help you meet the objectives of penetration testingΓÇöincluding deliverables and the final report.

  • av North Carolina, USA) Tiller & James S. (Raleigh
    1 396 - 2 336,-

    Cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security. This book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies.

  • - A Framework to Plan, Manage, and Maximize Benefits
    av James S. Tiller
    1 730,-

    CISO''s Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of the testing life cycle. He describes how to set test expectations and how to identify a good test from a bad one. He introduces the business characteristics of testing, the imposed and inherent limitations, and describes how to deal with those limitations. The book outlines a framework for protecting confidential information and security professionals during testing. It covers social engineering and explains how to tune the plethora of options to best use this investigative tool within your own environment. Ideal for senior security management and anyone else responsible for ensuring a sound security posture, this reference depicts a wide range of possible attack scenarios. It illustrates the complete cycle of attack from the hackerΓÇÖs perspective and presents a comprehensive framework to help you meet the objectives of penetration testingΓÇöincluding deliverables and the final report.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.