Welcome to Cheap2Price

    Penetration Testing Basics


    • Product Format: PDF Format
    • Publisher ‏ : ‎ Apress; 1st ed. edition (July 22, 2016)
    • Publication date ‏ : ‎ July 22, 2016
    • Language ‏ : ‎ English
    • File size ‏ : ‎ 13,102 KB
    • Text-to-Speech ‏ : ‎ Enabled
    • Enhanced typesetting ‏ : ‎ Enabled
    • X-Ray ‏ : ‎ Not Enabled
    • Word Wise ‏ : ‎ Not Enabled
    • Print length ‏ : ‎ 127 pages
    • Lending ‏ : ‎ Not Enabled

    Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you’ll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible.
    What You Will Learn:

    • Identify security vulnerabilities
    • Use some of the top security tools to identify holes
    • Read reports from testing tools
    • Spot and negate common attacks
    • Identify common Web-based attacks and exposures as well as recommendations for closing those holes

    Who This Book Is For:
    Anyone who has some familiarity with computers and an interest in information security and penetration testing.

    Editorial Reviews:

    “This volume is easy to read and quite pedagogical, which is maybe its greatest strength, together with putting together some examples and preparing the reader for them. Therefore, it is strongly recommended to chief information officers and IT operations and network operations directors, to ensure in-house information security processes are comprehensive enough. Next, it is also strongly recommended as a supplementary practice-oriented textbook for students in computer and information security, to guide them along in their perfection of this art.” (L.-F. Pau, Computing Reviews, April, 2017) 

    About the Author:

    Ric Messier, MS, GCIH, GSEC, CEH, CISSP is the program director for Cyber Security, Computer Forensics and Digital Investigations and the Economic Crime Investigation bachelors’ degree programs, as well as the Digital Forensic Science master’s degree program at Champlain College.
    Messier has been involved in the networking and security arena since the early 1980s. He has worked at large Internet service providers and small software companies developing knowledge and experience about a range of topics related to networking and security. Messier has also been involved on incident response teams and has been consulted on forensic investigations for large companies.
    An established expert in the field and author, Messier has published several articles for Hackin9 Magazine, has developed number of video training titles with O’Reilly Media and has written a number of books on information security.

    From the Back Cover:

    Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you’ll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible.

    Penetration Testing Basics explains:
    • How to identify security vulnerabilities
    • How to use some of the top security tools in order to identify holes
    • How to read reports from testing tools
    • Common vulnerability types and attacks
    • Common Web-based attacks and exposures as well as recommendations for closing those holes


    There are no reviews yet.

    Only logged in customers who have purchased this product may leave a review.

    Vendor Information

    • Sale!
      Rated 0 out of 5



      Our Technic Vitamin C range, helping to nourish the under-eye skin, keeping it moisturized and preventing dullness combining your everyday makeup essentials with skincare. Vitamin C is an antioxidant and helps to protect your skin from environmental damage, whilst brightening and effectively activates the cell energy of the delicate and sensitive skin of your eyelids, intensively nourishes, moisturizes, smooths out small wrinkles and reduces puffiness.

      • Specially developed for the under-eye area
      • Reduces swelling and dark circles
      • Contains with Vitamin C
      • Protects the skin from dehydration
      • Reduces signs of skin aging
      • Free paraffin and mineral oils
      • Cruelty free
      Add to cart
    • Rated 0 out of 5

      Fusce congue cursus metus


      Nulla feugiat felis tempor sem finibus egestas. Maecenas est nunc, faucibus in tristique nec, ornare et tortor. Mauris maximus lectus vel metus finibus, eget ullamcorper leo auctor. Donec at interdum nibh, in blandit massa. Nam pulvinar mollis quam

      Add to cart
    • Sale! Retailing Management Michael levy, Barton A Weitz 8th edition
      Rated 0 out of 5

      Retailing Management, Michael levy Barton A Weitz, 8th Edition


      Retailing is a high-tech, global, growth industry that plays a vital economic role in society. The authors’ objective in preparing the eighth edition is to stimulate student interest in retailing courses and careers by capturing the exciting, challenging, and rewarding opportunities facing both retailers and firms that sell their products and services to retailers, such as IBM and Proctor & Gamble. The textbook focuses on the strategic issues facing the retail industry and provides a current, informative, “good read” for students. The Eighth Edition maintains the basic philosophy of previous editions while focusing on key strategic issues with an emphasis on financial considerations and implementation through merchandise and store management. These strategic and tactical issues are examined for a broad spectrum of retailers, both large and small, domestic and international, selling merchandise and services.

      Add to cart
    • Sale!
      Rated 0 out of 5

      Sed pretium quam lacinia placerat


      Sed et posuere lacus. Etiam convallis dui lorem, ut accumsan metus consectetur vitae. Curabitur ultricies ante ultricies blandit placerat. Phasellus fermentum, ligula sed vestibulum blandit, mi odio laoreet sem, a venenatis tellus felis eu justo. Nullam ut felis et mauris iaculis malesuada. Donec non turpis vel lectus accumsan rutrum. Vestibulum finibus nunc libero, vel dapibus mauris porta vitae.

      Add to cart
    • Sale!
      Rated 0 out of 5

      From Hacking to Report Writing


      Product details:

      • Product Format: PDF Format
      • Publisher ‏ : ‎ Apress; 1st ed. edition (November 4, 2016)
      • Publication date ‏ : ‎ November 4, 2016
      • Language ‏ : ‎ English
      • File size ‏ : ‎ 3167 KB
      • Text-to-Speech ‏ : ‎ Enabled
      • Enhanced typesetting ‏ : ‎ Enabled
      • X-Ray ‏ : ‎ Not Enabled
      • Word Wise ‏ : ‎ Not Enabled
      • Print length ‏ : ‎ 204 pages
      • Lending ‏ : ‎ Not Enabled

      Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally report security weaknesses using techniques such as SQL-injection, denial-of-service attacks, and password hacking.

      Although From Hacking to Report Writing will give you the technical know-how needed to carry out advanced security tests, it also offers insight into crafting professional looking reports describing your work and how your customers can benefit from it. The book will give you the tools you need to clearly communicate the benefits of high-quality security and penetration testing to IT-management, executives and other stakeholders.

      Embedded in the book are a number of on-the-job stories that will give you a good understanding of how you can apply what you have learned to real-world situations.


      We live in a time where computer security is more important than ever. Staying one step ahead of hackers has never been a bigger challenge. From Hacking to Report Writing clarifies how you can sleep better at night knowing that your network has been thoroughly tested.

      What you’ll learn:

      • Clearly understand why security and penetration testing is important
      • Find vulnerabilities in any system using the same techniques as hackers do
      • Write professional looking reports
      • Know which security and penetration testing method to apply for any given situation
      • Successfully hold together a security and penetration test project

      Who This Book Is For:

      Aspiring security and penetration testers, security consultants, security and penetration testers, IT managers, and security researchers.

      Add to cart
    • Sale!
      Rated 0 out of 5

      Computer Security Fundamentals


      Product details:

      • Product Format: PDF Format
      • Publisher ‏ : ‎ Pearson IT Certification; 3rd edition (June 28, 2016)
      • Language ‏ : ‎ English
      • Paperback ‏ : ‎ 447 pages


      Clearly explains core concepts, terminology, challenges, technologies, and skills

      Covers today&;s latest attacks and countermeasures

      The perfect beginner&;s guide for anyone interested in a computer security career

      Chuck Easttom brings together complete coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started.

      Drawing on 20+ years of experience as a security instructor, consultant, and researcher, Easttom helps you take a proactive, realistic approach to assessing threats and implementing countermeasures. Writing clearly and simply, he addresses crucial issues that many introductory security books ignore, while addressing the realities of a world where billions of new devices are Internet-connected.

      This guide covers web attacks, hacking, spyware, network defense, security appliances, VPNs, password use, and much more. Its many tips and examples reflect new industry trends and the state-of-the-art in both attacks and defense. Exercises, projects, and review questions in every chapter help you deepen your understanding and apply all you&;ve learned.

      Whether you&;re a student, a professional, or a manager, this guide will help you protect your assets&;and expand your career options.

      Learn how to

      ·         Identify and prioritize potential threats to your network

      ·         Use basic networking knowledge to improve security

      ·         Get inside the minds of hackers, so you can deter their attacks

      ·         Implement a proven layered approach to network security

      ·         Resist modern social engineering attacks

      ·         Defend against today&;s most common Denial of Service (DoS) attacks

      ·         Halt viruses, spyware, worms, Trojans, and other malware

      ·         Prevent problems arising from malfeasance or ignorance

      ·         Choose the best encryption methods for your organization

      ·         Compare security technologies, including the latest security appliances

      ·         Implement security policies that will work in your environment

      ·         Scan your network for vulnerabilities

      ·         Evaluate potential security consultants

      ·         Master basic computer forensics and know what to do if you&;re attacked

      ·         Learn how cyberterrorism and information warfare are evolving


      Add to cart
    Select the fields to be shown. Others will be hidden. Drag and drop to rearrange the order.
    • Image
    • SKU
    • Rating
    • Price
    • Stock
    • Availability
    • Add to cart
    • Description
    • Content
    • Weight
    • Dimensions
    • Additional information
    • Attributes
    • Custom attributes
    • Custom fields
    Click outside to hide the compare bar
    Wishlist 0
    Open wishlist page Continue shopping