Narrow your search

Library

ULB (11)

KU Leuven (10)

Odisee (9)

Thomas More Kempen (9)

Thomas More Mechelen (9)

ULiège (9)

VIVES (9)

UCLL (7)

KBC (5)

UGent (5)

More...

Resource type

book (11)


Language

English (11)


Year
From To Submit

2024 (2)

2022 (2)

2020 (1)

2019 (3)

2016 (1)

More...
Listing 1 - 10 of 11 << page
of 2
>>
Sort by

Book
Getting Started with Pester 5 : A Beginner's Guide
Author:
ISBN: 9798868803062 Year: 2024 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Embark on a transformative journey into the world of Pester and elevate your PowerShell scripting to new heights of robustness, reliability, and efficiency. This comprehensive beginner's guide provides a hands-on approach to PowerShell testing using Pester, empowering you to enhance your code quality with confidence. The book starts with an introduction to Pester, the powerful testing and mocking framework for PowerShell. You'll gain a solid foundation by exploring Pester's fundamental building blocks. The book guides you through the phases of Pester, helping you write your initial Pester code. You will dive into topics such as tags, assertions with Should and parameter filters, and you will explore advanced techniques such as Test Drive and Test Registry. You will discover the art of mocking in Pester and master its advanced testing methodologies. You will gain insights into working without installed modules and seamlessly integrating Pester with Azure DevOps Pipeline for astreamlined testing process. After reading this book, you will have the knowledge and skills to initiate your own exploration into PowerShell testing with Pester. You will transform your scripts into reliable powerhouses, ensuring the resilience and quality of your PowerShell code. What Will You Learn Building blocks and phases of Pester Writing effective Pester tests Assertions, mocking, and advanced testing techniques Integration with Azure DevOps Tags, code coverage.


Book
Ethical hacking
Author:
ISBN: 9780776627915 Year: 2019 Publisher: [Ottawa] : University of Ottawa Press,


Book
The Business of Hacking : Creating, Developing, and Maintaining an Effective Penetration Testing Team
Authors: ---
ISBN: 9798868801747 Year: 2024 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that. The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client’s requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience. The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions. What you’ll learn How to handle and ongoing develop client relationships in a high end industry Team management and how the offensive security industry comes with its own unique challenges. Experience in other industries does not guarantee success in penetration testing. How to identify, understand, and over-deliver on client expectations. How to staff and develop talent within the team. Marketing opportunities and how to use the pentesting team as a wedge for upsell opportunities. The various structures of services available that they may present to their clients. Who This Book Is For This book is written for anyone curious who is interested in creating a penetration testing team or business. It is also relevant for anyone currently executing such a business and even for those simply participating in the business.


Book
Penetration Testing Basics : A Quick-Start Guide to Breaking into Systems
Author:
ISBN: 1484218566 1484218574 Year: 2016 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. Penetration Testing Basics explains: How to identify security vulnerabilities How to use some of the top security tools in order to identify holes How to read reports from testing tools Common vulnerability types and attacks Common Web-based attacks and exposures as well as recommendations for closing those holes.


Book
Handbook for CTFers
Author:
ISBN: 9789811903366 Year: 2022 Publisher: Singapore ; Beijing, China : Springer : Publishing House of Electronics Industry,


Book
IoT system testing : an IoT journey from devices to analytics and the edge
Author:
ISBN: 1484282752 1484282760 Year: 2022 Publisher: New York, New York : Apress Media LLC,

Loading...
Export citation

Choose an application

Bookmark

Abstract

To succeed, teams must assure the quality of IoT systems. The world of technology continually moves from one hot area to another; this book considers the next explosionof IoTfrom a quality testing viewpoint. You'll first gain an introduction to the Internet of Things (IoT), V&V, and testing. Next, you'll be walked through IoT test planning and strategy over the full life cycle, including the impact of data analytics and AI. You will then delve deeper into IoT security testing and various test techniques, patterns, and more. This is followed by a detailed study of IoT software test labs, architecture, environments and AI. There are many options for testing IoT qualities based on the criticality of the software and risks involved; each option has positives, negatives, as well as cost and schedule impacts. The book will guide start-up and experienced teams into these paths and help you to improve the testing and quality assessment of IoT systems. You will: Understand IoT software test architecture and planning Master IoT security testing and test techniques Study IoT test lab automation and architectures Review the need for IoT security, data analytics, AI, Neural Networks and dependability using testing and V&V.


Book
Quick Start Guide to Penetration Testing : With NMAP, OpenVAS and Metasploit
Author:
ISBN: 148424270X 1484242696 Year: 2019 Publisher: Berkeley, CA : Apress : Imprint: Apress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Get started with NMAP, OpenVAS, and Metasploit and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. In this short book you will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt. You will: Carryout basic scanning with NMAP Invoke NMAP from Python Use vulnerability scanning and reporting with OpenVAS Master common commands in Metasploit.


Book
Proceedings of International Ethical Hacking Conference 2018 : eHaCON 2018, Kolkata, India
Authors: --- --- ---
ISBN: 9811315442 9811315434 Year: 2019 Publisher: Singapore : Springer Singapore : Imprint: Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.


Book
Cyber security : deterrence and IT protection for critical infrastructures
Author:
ISBN: 3319022784 3319022792 Year: 2013 Publisher: New York : Springer,

Loading...
Export citation

Choose an application

Bookmark

Abstract

The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to resilience and security of Industrial Control Systems. The combination of contextual overview and future directions in the field makes this brief a useful resource for researchers and professionals studying systems security, data security and data structures. Advanced-level students interested in data security will also find this brief a helpful guide to recent research.

Keywords

Computer networks -- Security measures. --- Deterrence (Strategy). --- Penetration testing (Computer security). --- Social Welfare & Social Work --- Engineering & Applied Sciences --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Computer Science --- Cyberspace --- Computer crimes. --- Security measures. --- Computer security. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Computer Communication Networks. --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Distributed processing --- Crime --- Privacy, Right of --- Space and time --- Telematics --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks --- Internet --- Data encryption (Computer science) --- Deterrence (Strategy) --- Penetration testing (Computer security)


Book
The basics of hacking and penetration testing : ethical hacking and penetration testing made easy.
Author:
ISBN: 9780124116443 Year: 2013 Publisher: Amsterdam Elsevier Science

Listing 1 - 10 of 11 << page
of 2
>>
Sort by