Procuring penetration testing services.

This book discusses using penetration testing to secure an organization's IT environment while continuing to meet its business and brand objectives. The threat to key systems is increasing; the probability of a security weakness being accidentally exposed or maliciously exploited must be contin...

Full description

Saved in:
Bibliographic Details
Corporate Author: Crest
Format: eBook
Language:English
Published: Ely, Cambridge, UK : IT Governance Pub., 2014.
Subjects:
Online Access:Click for online access

MARC

LEADER 00000cam a2200000 a 4500
001 ocn888035952
003 OCoLC
005 20241006213017.0
006 m o d
007 cr unu||||||||
008 140820s2014 enka o 000 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d EBLCP  |d STF  |d DEBSZ  |d B24X7  |d DEBBG  |d COO  |d YDXCP  |d JSTOR  |d OCLCF  |d OCLCQ  |d LIV  |d MERUC  |d OCLCQ  |d IOG  |d CEF  |d OCLCQ  |d LVT  |d UAB  |d OCLCQ  |d BRF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL  |d DEGRU  |d UEJ  |d OCLCQ 
019 |a 957735651 
020 |a 9781849285766  |q (electronic bk.) 
020 |a 1849285764  |q (electronic bk.) 
020 |z 1849285764 
020 |z 1849285756 
020 |z 9781849285759 
035 |a (OCoLC)888035952  |z (OCoLC)957735651 
037 |a CL0500000466  |b Safari Books Online 
037 |a 22573/ctt14zp6gg  |b JSTOR 
050 4 |a QA76.9.A25  |b .P763 2014 
072 7 |a COM053000  |2 bisacsh 
049 |a HCDD 
245 0 0 |a Procuring penetration testing services. 
260 |a Ely, Cambridge, UK :  |b IT Governance Pub.,  |c 2014. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed August 9, 2014). 
520 |a This book discusses using penetration testing to secure an organization's IT environment while continuing to meet its business and brand objectives. The threat to key systems is increasing; the probability of a security weakness being accidentally exposed or maliciously exploited must be continually assessed to ensure that the level of risk is at an acceptable level for the business. A penetration test involves the use of a variety of manual and automated techniques to simulate an attack on an organization's information security arrangements. When carried out and reported properly, it can yield knowledge of nearly all technical security weaknesses and provide the information and support required to remove or reduce them. Other significant benefits of effective penetration testing can include: a reduction in IT costs over the long term; improvements in the technical environment, reducing support calls; greater levels of confidence in the security of IT environments; and increased awareness of the need for appropriate technical controls. --  |c Edited summary from book. 
505 0 0 |t Procuring Penetration Testing Services 
650 0 |a Penetration testing (Computer security) 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Penetration testing (Computer security)  |2 fast 
710 2 |a Crest. 
758 |i has work:  |a Procuring Penetration Testing Services (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCYmvpvWC7f8XfWGt4yQpRq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
856 4 0 |u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=1778766  |y Click for online access 
903 |a EBC-AC 
994 |a 92  |b HCD