000 | 01351nam a22001817a 4500 | ||
---|---|---|---|
007 | ta | ||
008 | 240321b |||||||| |||| 00| 0 eng d | ||
020 | _a9789355512154 | ||
040 | _cZET-ke | ||
050 |
_aQA76.3 _b.R35 2022 |
||
100 | _aRakshit, Samir Kumar | ||
245 |
_aEthical hacker's penetration testing guide: _bVulnerability assessment and attack simulation on web, mobile, network services and wireless networks/ _cby Samir Kumar Rakshit |
||
260 |
_aIndia: _bBPB publications, _cc2022 |
||
300 |
_axxiii, 448p.: _bill, _c23cm |
||
500 | _aincl. index | ||
505 | _aOverviwe of web and related technologies and understanding the application -- Web penetration testing through code review -- Web penetration testing-injection attacks-- Fuzzing, dynamic scanning of REST API and web application -- Web penetration testing-and validated redirects/fowards, SSRF -- Pen testing for authentication, authorization byapass and business logic flows -- Pentesting for senstive data, vulnerable components, security monitoring -- Exploiting file upload functionality and XXE attack -- Web penetration testing: Thick client -- Introduction to network pentesting -- Introduction to wireless pentesting -- Penetration testing-Mobile app -- Security automation for web pentaste -- Setting up pentest lab | ||
942 |
_2lcc _cBK _hQA76.3 _kQA76.3 _m.R35 2022 |
||
999 |
_c6002 _d6002 |