INDEX

acceptable use policies (AUPs) 30

access control functionality 139

after-effects 43

Agile 47, 86

Aircrack-ng 103

Anti-malware products 634

attacks

chains 139

vectors 53, 137, 144n5

BAE Systems 57

benchmarking 201

best practice 1078

BeyondTrust 102

black-box testing 16, 723, 101

Boomerang Video Ltd 389, 43

bottom-up approaches 1089

brand preservation 43

bring-your-own-device service (BYOD) 32

budgets 51, 623, 70, 133

bug trackers 1313

Burp Suite 104

business impact analyses 130, 137

buy-ins 1415

calendar juggling 63

cardholder data environment (CDE) 56

CCTV systems 67

CEH (Certified Ethical Hacker) 93

CESG CHECK scheme (UK) 93

change management 1313

CHECK (penetration testing scheme) 1920, 29, 44, 47, 124

chief information security ...

Get Penetration Testing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.