Tuesday, May 21, 2019

From Hacking to Report Writing: An Introduction to Security and Penetration Testing

File Size: 3.43 Mb

We connected our Christmas gift to the TV and flipped the power switch. A line of text that read Commodore 64 Basic was displayed over the blue-framed background. In an almost overwhelming state of excitement, I – then eight years old – eagerly awaited our new computer to start showing us all the games it had in store for us. But it didn’t. The only thing that happened on the screen was the display of the word “ready.” Our new futuristic friend was apparently ready. I just didn’t know for what.

I sat there hoping that my brother, who was always the smarter one, would somehow get us out of this anti-climactic situation. He did. By typing in a few commands that made no sense to me, we were soon gaming the December evening away. My love-hate relationship with computers started then and there. Fast forward thirty years and computers are literally everywhere: they keep an eye on your well being when you’ve been hospitalized. They are used by nation-states to monitor everything imaginable in the name of national security. And I hardly need to mention that the Internet is the perfect place to waste your time when you could be doing something useful instead. It is simply getting harder and harder to imagine a world without computers.

About the Author
About the Technical Reviewer
Chapter 1: Introduction
Chapter 2: Security Testing Basics
Chapter 3: The Security Testing Process
Chapter 4: Technical Preparations
Chapter 5: Security Test Execution
Chapter 6: Identifying Vulnerabilities
Chapter 7: Exploiting Vulnerabilities
Chapter 8: Reporting Vulnerabilities
Chapter 9: Example Reports
Chapter 10: Ten Tips to Become a Better Security Tester

Author Details
"Robert Svensson"

Download Drive-1

You May Also Like These E-Books:-

No comments:

Post a Comment