Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
182 ◾  Information Security Management Handbook
competency to a certain degree. For example, if a testing team state that they are going to be using
Nmap as the only tool for a web application test, it should raise concerns because that tool is not
designed to be a web application tool. Knowing the exact tools being employed is also useful for
understanding and preparing for any possible side effects that could result from the testing activity.
A professional security testing team should follow a structured methodology for conducting
any type of test. Two requirements for the security testing process are consistency and repeat-
ability. e implementation of a consistent testing methodology ensures that the process will be
performed the same way ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498