Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 10307 dokumen yang sesuai dengan query
cover
New York: McGraw-Hill, 2007
R 005.8 GRA
Buku Referensi  Universitas Indonesia Library
cover
New York : McGraw-Hill, 2011
005.8 GRA
Buku Teks  Universitas Indonesia Library
cover
Dony Ariyus
Yogyakarta: Andi, 2005
005.8 DON k
Buku Teks  Universitas Indonesia Library
cover
Engebretson, Pat
Amsterdam : Elsevier, 2013
005.8 ENG b
Buku Teks  Universitas Indonesia Library
cover
Amsterdam: Elsevier, 2012
005.8 LOW
Buku Teks  Universitas Indonesia Library
cover
"Professional penetration testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices.
Author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book you can benefit from his years of experience as a professional penetration tester and educator. After reading this book, you will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios."
Waltham, MA: Syngress, 2013
e20427657
eBooks  Universitas Indonesia Library
cover
Cheswick, William R.
Masschusetts: Addison-Wesley, 1994
005.8 CHE f
Buku Teks  Universitas Indonesia Library
cover
"The basics of web hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities.
The basics of web hacking provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user.
With Dr. Pauli’s approach, you will fully understand the what/where/why/how of the most widespread Web vulnerabilities and how easily they can be exploited with the correct tools. You will learn how to set up a safe environment to conduct these attacks, including an attacker Virtual Machine (VM) with all necessary tools and several known-vulnerable Web application VMs that are widely available and maintained for this very purpose. "
Waltham, MA: Syngress, 2013
e20427748
eBooks  Universitas Indonesia Library
cover
Bathurst, Robert
Boston : Syngress , 2013
005.268 BAT h
Buku Teks  Universitas Indonesia Library
cover
"This book discusses the implications of new technologies for a secured society. As such, it reflects the main focus of the International Conference on Ethical Hacking, eHaCon 2018, which is essentially in evaluating the security of computer systems using penetration testing techniques. Showcasing the most outstanding research papers presented at the conference, the book shares new findings on computer network attacks and defenses, commercial security solutions, and hands-on, real-world security experience. The respective sections include network security, ethical hacking, cryptography, digital forensics, cloud security, information security, mobile communications security, and cyber security."
Singapore: Springer Singapore, 2019
e20502821
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>