|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
ocn888035952 |
003 |
OCoLC |
005 |
20241006213017.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
140820s2014 enka o 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e pn
|c UMI
|d EBLCP
|d STF
|d DEBSZ
|d B24X7
|d DEBBG
|d COO
|d YDXCP
|d JSTOR
|d OCLCF
|d OCLCQ
|d LIV
|d MERUC
|d OCLCQ
|d IOG
|d CEF
|d OCLCQ
|d LVT
|d UAB
|d OCLCQ
|d BRF
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|d DEGRU
|d UEJ
|d OCLCQ
|
019 |
|
|
|a 957735651
|
020 |
|
|
|a 9781849285766
|q (electronic bk.)
|
020 |
|
|
|a 1849285764
|q (electronic bk.)
|
020 |
|
|
|z 1849285764
|
020 |
|
|
|z 1849285756
|
020 |
|
|
|z 9781849285759
|
035 |
|
|
|a (OCoLC)888035952
|z (OCoLC)957735651
|
037 |
|
|
|a CL0500000466
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt14zp6gg
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|b .P763 2014
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
049 |
|
|
|a HCDD
|
245 |
0 |
0 |
|a Procuring penetration testing services.
|
260 |
|
|
|a Ely, Cambridge, UK :
|b IT Governance Pub.,
|c 2014.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed August 9, 2014).
|
520 |
|
|
|a This book discusses using penetration testing to secure an organization's IT environment while continuing to meet its business and brand objectives. The threat to key systems is increasing; the probability of a security weakness being accidentally exposed or maliciously exploited must be continually assessed to ensure that the level of risk is at an acceptable level for the business. A penetration test involves the use of a variety of manual and automated techniques to simulate an attack on an organization's information security arrangements. When carried out and reported properly, it can yield knowledge of nearly all technical security weaknesses and provide the information and support required to remove or reduce them. Other significant benefits of effective penetration testing can include: a reduction in IT costs over the long term; improvements in the technical environment, reducing support calls; greater levels of confidence in the security of IT environments; and increased awareness of the need for appropriate technical controls. --
|c Edited summary from book.
|
505 |
0 |
0 |
|t Procuring Penetration Testing Services
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
710 |
2 |
|
|a Crest.
|
758 |
|
|
|i has work:
|a Procuring Penetration Testing Services (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCYmvpvWC7f8XfWGt4yQpRq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
856 |
4 |
0 |
|u https://ebookcentral.proquest.com/lib/holycrosscollege-ebooks/detail.action?docID=1778766
|y Click for online access
|
903 |
|
|
|a EBC-AC
|
994 |
|
|
|a 92
|b HCD
|