Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
169
7
Pe n e t r a t i o n te s t i n g
ol d a n d ne w
us far in security de-engineering, I have covered the dilemma faced
by the networked business world in the area of information risk man-
agement skills. e skills issue is applicable to all facets of the delivery
of information security in the majority of larger organizations.
With regard network penetration testing, in Chapter 2, I cov-
ered some aspects of the older style delivery of penetration testing,
but the focus was on the skills involved rather than the methodol-
ogy. In Chapter 4, I looked out how cheap/free automated testing
tools replaced the Hacker ethic in vulnerability assessment in gen-
eral. In Chapter 5, I looked into the details of autoscanners and Web
autoscanners 
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355