INDEX
acceptable use policies (AUPs) 30
access control functionality 139
after-effects 43
Aircrack-ng 103
attacks
chains 139
BAE Systems 57
BeyondTrust 102
black-box testing 16, 72–3, 101
brand preservation 43
bring-your-own-device service (BYOD) 32
Burp Suite 104
business impact analyses 130, 137
calendar juggling 63
cardholder data environment (CDE) 56
CEH (Certified Ethical Hacker) 93
CESG CHECK scheme (UK) 93
CHECK (penetration testing scheme) 19–20, 29, 44, 47, 124
chief information security ...
Get Penetration Testing now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.