Listing 1 - 10 of 11 | << page >> |
Sort by
|
Choose an application
Embark on a transformative journey into the world of Pester and elevate your PowerShell scripting to new heights of robustness, reliability, and efficiency. This comprehensive beginner's guide provides a hands-on approach to PowerShell testing using Pester, empowering you to enhance your code quality with confidence. The book starts with an introduction to Pester, the powerful testing and mocking framework for PowerShell. You'll gain a solid foundation by exploring Pester's fundamental building blocks. The book guides you through the phases of Pester, helping you write your initial Pester code. You will dive into topics such as tags, assertions with Should and parameter filters, and you will explore advanced techniques such as Test Drive and Test Registry. You will discover the art of mocking in Pester and master its advanced testing methodologies. You will gain insights into working without installed modules and seamlessly integrating Pester with Azure DevOps Pipeline for astreamlined testing process. After reading this book, you will have the knowledge and skills to initiate your own exploration into PowerShell testing with Pester. You will transform your scripts into reliable powerhouses, ensuring the resilience and quality of your PowerShell code. What Will You Learn Building blocks and phases of Pester Writing effective Pester tests Assertions, mocking, and advanced testing techniques Integration with Azure DevOps Tags, code coverage.
Choose an application
Penetration testing (Computer security) --- Tests d'intrusion --- Hacking --- Piratage informatique --- Hackers --- Pirates informatiques --- Computer security --- Sécurité informatique --- Moral and ethical aspects. --- Aspect moral --- Legal status, laws, etc. --- Droit --- Law and legislation. --- Droit
Choose an application
There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that. The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client’s requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience. The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions. What you’ll learn How to handle and ongoing develop client relationships in a high end industry Team management and how the offensive security industry comes with its own unique challenges. Experience in other industries does not guarantee success in penetration testing. How to identify, understand, and over-deliver on client expectations. How to staff and develop talent within the team. Marketing opportunities and how to use the pentesting team as a wedge for upsell opportunities. The various structures of services available that they may present to their clients. Who This Book Is For This book is written for anyone curious who is interested in creating a penetration testing team or business. It is also relevant for anyone currently executing such a business and even for those simply participating in the business.
Penetration testing (Computer security) --- Hacking. --- Management. --- Data protection. --- Computer crimes. --- Risk management. --- Data protection --- Data and Information Security. --- Computer Crime. --- Security Services. --- IT Risk Management. --- Privacy. --- Law and legislation.
Choose an application
Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. Penetration Testing Basics explains: How to identify security vulnerabilities How to use some of the top security tools in order to identify holes How to read reports from testing tools Common vulnerability types and attacks Common Web-based attacks and exposures as well as recommendations for closing those holes.
Computer science. --- Computer programming. --- Software engineering. --- Programming languages (Electronic computers). --- Computer Science. --- Programming Techniques. --- Software Engineering. --- Programming Languages, Compilers, Interpreters. --- Penetration testing (Computer security) --- Ethical hacking (Computer security) --- Computer security --- Data protection. --- Security. --- Computer software engineering --- Engineering --- Informatics --- Science --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computers --- Electronic computer programming --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Programming
Choose an application
Computer networks --- Computer security. --- Penetration testing (Computer security) --- Access control. --- Ethical hacking (Computer security) --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data sovereignty --- Protection --- Security measures --- Seguretat informàtica --- Control d'accés als ordinadors --- Pirates informàtics
Choose an application
To succeed, teams must assure the quality of IoT systems. The world of technology continually moves from one hot area to another; this book considers the next explosionof IoTfrom a quality testing viewpoint. You'll first gain an introduction to the Internet of Things (IoT), V&V, and testing. Next, you'll be walked through IoT test planning and strategy over the full life cycle, including the impact of data analytics and AI. You will then delve deeper into IoT security testing and various test techniques, patterns, and more. This is followed by a detailed study of IoT software test labs, architecture, environments and AI. There are many options for testing IoT qualities based on the criticality of the software and risks involved; each option has positives, negatives, as well as cost and schedule impacts. The book will guide start-up and experienced teams into these paths and help you to improve the testing and quality assessment of IoT systems. You will: Understand IoT software test architecture and planning Master IoT security testing and test techniques Study IoT test lab automation and architectures Review the need for IoT security, data analytics, AI, Neural Networks and dependability using testing and V&V.
Internet of things --- Computer security. --- Penetration testing (Computer security) --- Security measures --- Testing. --- Ethical hacking (Computer security) --- Computer security --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Protection
Choose an application
Get started with NMAP, OpenVAS, and Metasploit and understand how NMAP, OpenVAS, and Metasploit can be integrated with each other for greater flexibility and efficiency. In this short book you will begin by working with NMAP and ZENMAP and learning the basic scanning and enumeration process. After getting to know the differences between TCP and UDP scans, you will learn to fine tune your scans and efficiently use NMAP scripts. This will be followed by an introduction to OpenVAS vulnerability management system. You will then learn to configure OpenVAS and scan for and report vulnerabilities. The next chapter takes you on a detailed tour of Metasploit and its basic commands and configuration. You will then invoke NMAP and OpenVAS scans from Metasploit. Lastly, you will take a look at scanning services with Metasploit and get to know more about Meterpreter, an advanced, dynamically extensible payload that is extended over the network at runtime. The final part of the book concludes by pentesting a system in a real-world scenario, where you will apply the skills you have learnt. You will: Carryout basic scanning with NMAP Invoke NMAP from Python Use vulnerability scanning and reporting with OpenVAS Master common commands in Metasploit.
Penetration testing (Computer security) --- Computer networks --- Security measures --- Testing. --- Data protection. --- Computer security. --- Software engineering. --- Security. --- Systems and Data Security. --- Software Engineering. --- Computer software engineering --- Engineering --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Protection
Choose an application
This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security.
Penetration testing (Computer security) --- Telecommunication. --- Computer security. --- Data structures (Computer scienc. --- Communications Engineering, Networks. --- Systems and Data Security. --- Data Structures and Information Theory. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Protection --- Security measures --- Electrical engineering. --- Data structures (Computer science). --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Electric engineering --- Engineering
Choose an application
The experts of the International Working Group-Landau Network Centro Volta (IWG-LNCV) discuss aspects of cyber security and present possible methods of deterrence, defense and resilience against cyber attacks. This SpringerBrief covers state-of-the-art documentation on the deterrence power of cyber attacks and argues that nations are entering a new cyber arms race. The brief also provides a technical analysis of possible cyber attacks towards critical infrastructures in the chemical industry and chemical safety industry. The authors also propose modern analyses and a holistic approach to resilience and security of Industrial Control Systems. The combination of contextual overview and future directions in the field makes this brief a useful resource for researchers and professionals studying systems security, data security and data structures. Advanced-level students interested in data security will also find this brief a helpful guide to recent research.
Computer networks -- Security measures. --- Deterrence (Strategy). --- Penetration testing (Computer security). --- Social Welfare & Social Work --- Engineering & Applied Sciences --- Social Sciences --- Criminology, Penology & Juvenile Delinquency --- Computer Science --- Cyberspace --- Computer crimes. --- Security measures. --- Computer security. --- Computers and crime --- Cyber crimes --- Cybercrimes --- Electronic crimes (Computer crimes) --- Internet crimes --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Computer science. --- Computer communication systems. --- Data structures (Computer science). --- Data encryption (Computer science). --- Computer Science. --- Systems and Data Security. --- Information Systems Applications (incl. Internet). --- Data Encryption. --- Data Structures, Cryptology and Information Theory. --- Computer Communication Networks. --- Data protection --- Security systems --- Hacking --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Informatics --- Science --- Distributed processing --- Crime --- Privacy, Right of --- Space and time --- Telematics --- Data structures (Computer scienc. --- Cryptology. --- Data Structures and Information Theory. --- Data structures (Computer science) --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer networks --- Internet --- Data encryption (Computer science) --- Deterrence (Strategy) --- Penetration testing (Computer security)
Choose an application
Penetration testing (Computer security) --- Computer hackers --- Computer software --- Computer crimes --- Pirates informatiques --- Logiciels --- Criminalité informatique --- Testing --- Prevention --- Essais --- Prévention --- AA / International- internationaal --- 654 --- 681.3*D46 --- 681.3*K41 --- Informatieverwerking. Bureautica. --- Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Public policy issues: abuse and crime involving computers, computer-related health issues, ethics, human safety, intellectual property rights, privacy, regulation, transborder data flow, use/abuse of power --- Tests d'intrusion --- 681.3*D46 Security and protection: access controls; authentication; cryptographic controls; information flow controls; security kernels; verification (Operating systems) --- Hackers. --- Criminalité informatique --- Prévention --- Ethical hacking (Computer security) --- Computer security --- Software, Computer --- Computer systems --- Computer programmers --- Computer users --- Informatieverwerking. Bureautica --- PXL-Central Office 2014 --- computerbeveiliging --- hacken --- Testing.
Listing 1 - 10 of 11 | << page >> |
Sort by
|