Wednesday, December 7, 2011

Jim Tiller's latest book, "CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits," publishes

Presenting the underlying methodologies and concepts required for successful penetration testing, CISO's Guide to Penetration Testing discusses the process of penetration testing from both consultative and technical perspectives. Jim provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. He depicts attack scenarios to show the complete cycle of attack from the hacker’s perspective. His methodology provides a comprehensive solution to meeting the objectives of penetration testing. Jim covers the deliverables, including the final report, explaining how to use the information from the text. The book includes a six-panel fold out process map.

2 comments:

  1. This comment has been removed by a blog administrator.

    ReplyDelete
  2. Presenting the underlying methodologies and concepts required for successful penetration testing, CISO's Guide to Penetration Testing discusses the process of penetration testing from both consultative and technical perspectives. security cages

    ReplyDelete