Wednesday, December 7, 2011
Jim Tiller's latest book, "CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits," publishes
Presenting the underlying methodologies and concepts required for successful penetration testing, CISO's Guide to Penetration Testing discusses the process of penetration testing from both consultative and technical perspectives. Jim provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. He depicts attack scenarios to show the complete cycle of attack from the hacker’s perspective. His methodology provides a comprehensive solution to meeting the objectives of penetration testing. Jim covers the deliverables, including the final report, explaining how to use the information from the text. The book includes a six-panel fold out process map.
Subscribe to:
Post Comments (Atom)
This comment has been removed by a blog administrator.
ReplyDeletePresenting the underlying methodologies and concepts required for successful penetration testing, CISO's Guide to Penetration Testing discusses the process of penetration testing from both consultative and technical perspectives. security cages
ReplyDelete