• Complain

Ali Shakeel - BackTrack 4: assuring security by penetration testing: master the art of penetration testing with BackTrack

Here you can read online Ali Shakeel - BackTrack 4: assuring security by penetration testing: master the art of penetration testing with BackTrack full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Birmingham, U.K, year: 2011, publisher: Packt Open Source;Packt Publishing, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Ali Shakeel BackTrack 4: assuring security by penetration testing: master the art of penetration testing with BackTrack
  • Book:
    BackTrack 4: assuring security by penetration testing: master the art of penetration testing with BackTrack
  • Author:
  • Publisher:
    Packt Open Source;Packt Publishing
  • Genre:
  • Year:
    2011
  • City:
    Birmingham, U.K
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

BackTrack 4: assuring security by penetration testing: master the art of penetration testing with BackTrack: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "BackTrack 4: assuring security by penetration testing: master the art of penetration testing with BackTrack" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Ali Shakeel: author's other books


Who wrote BackTrack 4: assuring security by penetration testing: master the art of penetration testing with BackTrack? Find out the surname, the name of the author of the book and a list of all author's works by series.

BackTrack 4: assuring security by penetration testing: master the art of penetration testing with BackTrack — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "BackTrack 4: assuring security by penetration testing: master the art of penetration testing with BackTrack" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
BackTrack 4: Assuring Security by Penetration Testing

BackTrack 4: Assuring Security by Penetration Testing

Copyright 2011 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

First published: April 2011

Production Reference: 1070411

Published by Packt Publishing Ltd. 32 Lincoln Road Olton Birmingham, B27 6PA, UK.

ISBN 978-1-849513-94-4

www.packtpub.com

Cover Image by Faiz fattohi ( <> )

Credits

Authors

Shakeel Ali

Tedi Heriyanto

Reviewers

Mike Beatty

Peter Van Eeckhoutte

Arif Jatmoko

Muhammad Rasyid Sahputra

Acquisition Editor

Tarun Singh

Development Editor

Kartikey Pandey

Technical Editor

Kavita Iyer

Copy Editor

Neha Shetty

Indexers

Hemangini Bari

Tejal Daruwale

Editorial Team Leader

Akshara Aware

Project Team Leader

Priya Mukherji

Project Coordinator

Sneha Harkut

Proofreader

Samantha Lyon

Graphics

Nilesh Mohite

Production Coordinator

Kruthika Bangera

Cover Work

Kruthika Bangera

About the Authors

Shakeel Ali is the main founder and CTO of Cipher Storm Ltd, UK. His expertise in the security industry markedly exceeds the standard number of security assessments, audits, compliance, governance, and forensic projects that he carries in day-to-day operations. He has also served as a Chief Security Officer at CSS-Providers S.A.L. As a senior security evangelist and having spent endless nights without taking a nap, he provides constant security support to various businesses, educational organizations, and government institutions globally. He is an active independent researcher who writes various articles and whitepapers, and manages a blog at Ethical-Hacker.net. He also regularly participates in BugCon Security Conferences held in Mexico, to highlight the best-of-breed cyber security threats and their solutions from practically driven countermeasures.

I would like to thank all my friends, reviewers, and colleagues who were cordially involved in this book project. Special thanks to the entire Packt Publishing team, and their technical editors and reviewers who have given invaluable comments, suggestions, feedback, and support to make this project successful. I also want to thank Tedi Heriyanto (co-author) whose continual dedication, contributions, ideas, and technical discussions led to produce the useful product you see today. Last but not least, thanks to my pals from past and present with whom the sudden discovery never ends, and whose vigilant eyes turn an IT industry into a secure and stable environment.

Tedi Heriyanto currently works as a Senior Technical Consultant in an Indonesian information technology company. He has worked with several well-known institutions in Indonesia and overseas, in designing secure network architecture, deploying and managing enterprise-wide security systems, developing information security policies and procedures, doing information security audit and assessment, and giving information security awareness training. In his spare time, he manages to research, write various articles, participate in Indonesian Security Community activities, and maintain a blog site located at http://theriyanto.wordpress.com. He shares his knowledge in the information security field by writing several information security and computer programming books.

I would like to thank my family for supporting me during the whole book writing process. I would also like to thank my friends who guided me in the infosec field and were always available to discuss infosec issues: Gildas Deograt, Mada Perdhana, Pamadi Gesang, and Tom Gregory. Thanks to the technical reviewers who have provided their best knowledge in their respective fields: Arif Jatmoko, Muhammad Rasyid Sahputra, and Peter "corelanc0d3r" Van Eeckhoutte. Also thanks to the great people at Packt Publishing (Kartikey Pandey, Kavita Iyer, Tarun Singh, and Sneha Harkut), whose comments, feedback, and immediate support has turned this book development project into a successful reality. Last but not least, I would like to give my biggest thanks to my co-author, Shakeel Ali, whose technical knowledge, motivation, ideas, and suggestions made the book writing process a wonderful journey.

About the Reviewers

Peter "corelanc0d3r" Van Eeckhoutte is the founder of Corelan Team (http://www.corelan.be), bringing together a group of people who have similar interests: performing IT security/vulnerability research, sharing knowledge, writing and publishing tutorials, releasing security advisories and writing tools. His Win32 Exploit Writing Tutorial series and Immunity Debugger PyCommand "pvefindaddr" are just a few examples of his work in the security community. Peter has been working on IT security since the late 90's, focusing on exploit development since 2006.

I would like to thank my wife and daughter for their everlasting support and love, and the folks at the Corelan Team for being a truly awesome bunch of friends to work with.

Arif Jatmoko (MCom, CISSP, CISA, CCSP, CEH) is an IT Security Auditor at Bank Mandiri tbk, the biggest bank in Indonesia. Arif has spent over 15 years working as a computer security specialist. Since 1999, he joined a top Fortune 500 company as the IT security officer, runs several projects in government and military institutions, is a pentester at big4 audit firm and a few major financial institutions.

Since his early school years, Arif has enjoyed coding, debugging, and other reverse engineering stuff. These hobbies have given him the skill to perform security incident analysis for many years. Later (during his more current jobs), Arif was found to be most interested in incident analysis and computer forensics. Especially as an auditor, he frequently deals with investigative analysis in criminals and other fraudulent activities inside the company.

Muhammad Rasyid Sahputra currently works as a Security Consultant at Xynexis International. His interests range from analyzing various bugs of open-source and commercial software/products to hacking telecommunication infrastructure

www.PacktPub.com
Support files, eBooks, discount offers and more

You might want to visit www.PacktPub.com for support files and downloads related to your book.

Did you know that Packt offers eBook versions of every book published, with PDF and ePub files available? You can upgrade to the eBook version at > for more details.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «BackTrack 4: assuring security by penetration testing: master the art of penetration testing with BackTrack»

Look at similar books to BackTrack 4: assuring security by penetration testing: master the art of penetration testing with BackTrack. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «BackTrack 4: assuring security by penetration testing: master the art of penetration testing with BackTrack»

Discussion, reviews of the book BackTrack 4: assuring security by penetration testing: master the art of penetration testing with BackTrack and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.