Skip to Content
Security De-Engineering
book

Security De-Engineering

by Ian Tibble
December 2011
Intermediate to advanced content levelIntermediate to advanced
332 pages
9h 15m
English
Auerbach Publications
Content preview from Security De-Engineering
Penetration teSting—olD anD new 179
eciency of the testing will be reduced to a level where little can be
achieved in the time available.
If the organization under testing wants to see some return on
investment, then penetration testers need to be allowed to carry out
whatever tests and tricks they deem t, and the tests need to be per-
formed without worrying about waiting for client permission. Older
style, pre-2000s penetration tests did not follow any strict pattern
as such. A number of tests were performed based on the results of
other tests, and based on those test results, more tests were performed.
Hacker testing teams would work 20-hour shifts, then sleep 10 hours,
and then start all over again for the entire testing window. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Advanced Persistent Threat

Advanced Persistent Threat

Eric Cole
Point & Click OpenOffice.org!

Point & Click OpenOffice.org!

Robin ‘Roblimo’ Miller

Publisher Resources

ISBN: 9781439868355