Yassine Maleh (National School of Applied Sciences)
Traditional vs Generative AI Pentesting
A Hands-On Approach to Hacking
Yassine Maleh (National School of Applied Sciences)
Traditional vs Generative AI Pentesting
A Hands-On Approach to Hacking
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI.
Andere Kunden interessierten sich auch für
Bryson PayneGo H*ck Yourself35,99 €
Daniel GrahamEthical Hacking28,99 €
Daniel ReillyMath for Security28,99 €
Patrick WardleThe Art of Mac Malware28,99 €
David KennedyMetasploit38,29 €
Chris PattenBlack Hat Go25,99 €
Peter YaworskiReal-World Bug Hunting28,99 €-
-
-
Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 316
- Erscheinungstermin: 25. September 2025
- Englisch
- Abmessung: 254mm x 178mm x 17mm
- Gewicht: 600g
- ISBN-13: 9781041073994
- ISBN-10: 1041073992
- Artikelnr.: 73776834
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 316
- Erscheinungstermin: 25. September 2025
- Englisch
- Abmessung: 254mm x 178mm x 17mm
- Gewicht: 600g
- ISBN-13: 9781041073994
- ISBN-10: 1041073992
- Artikelnr.: 73776834
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Yassine Maleh is an Associate professor of cybersecurity at Sultan Moulay Slimane University, Morocco, since 2019. He is a double PhD in Cybersecurity and IT Management. He is the founding chair of IEEE Consultant Network Morocco and founding president of the African Research Center of Information Technology & Cybersecurity. He is a former CISO at the National Port Agency between 2012-2019. He is a senior member of IEEE and a member of the International Association of Engineers IAENG and The Machine Intelligence Research Labs. Dr Maleh has made contributions in the fields of information security and privacy, Internet of things security, wireless and constrained networks security. His research interests include information security and privacy, Internet of things, networks security, information system, and IT governance. He has published over than 250 papers (international journals, book chapters and conferences/workshops), 40 edited books, and 6 authored books. He is the editor-in-chief of the International Journal of Information Security and Privacy (IJISP, IF: 0.8), and the International Journal of Smart Security Technologies (IJSST). He serves as an associate editor for IEEE Access, since 2019 (Impact Factor 4.098), the International Journal of Digital Crime and Forensics (IJDCF), and the International Journal of Information Security and Privacy (IJISP). He is a series editor of Advances in Cybersecurity Management, by CRC Taylor & Francis. He was also a guest editor for many special issues with prestigious journals (IEEE transactions on industrial informatics, IEEE Engineering Management Review, Sensors, Big Data Journal). He has served and continues to serve on executive and technical program committees and as a reviewer of numerous international conferences and journals such as Elsevier Ad Hoc Networks, IEEE Network Magazine, IEEE Sensor Journal, ICT Express, and Springer Cluster Computing. He was the General chair and publication chair of many international conferences (BCCA 2019, MLBDACP 19, ICI2C'21, ICACNGC 2022, CCSET'22, IEEE ISC2 2022, ISGTA'24, etc...). He received Publons Top 1% reviewer award for the years 2018 and 2019. He holds numerous certifications demonstrating his knowledge and expertise in the field of cybersecurity from major organisations such as ISC2, Fortinet, CEH, Cisco, IBM, Microsoft, CompTIA and others.
Preface About the Author Chapter 1: Foundations of Pentesting:
Methodologies, Frameworks, and AI Integration Chapter 2: Building a Modern
Penetration Testing Lab with Generative AI Chapter 3: GenAI-Driven
Reconnaissance for Effective Penetration Testing Chapter 4: GenAI-Enhanced
Scanning and Sniffing Chapter 5: Vulnerability Assessment: Tools,
Techniques, and GenAI Integration Chapter 6: AI-Driven Social Engineering
and Penetration Testing Chapter 7: GenAI Driven Exploitation Testing
Techniques Chapter 8: Post-Exploitation Techniques and AI-Driven Privilege
Escalation Chapter 9: GenAI for Automating and Enhancing Penetration
Testing Reports
Methodologies, Frameworks, and AI Integration Chapter 2: Building a Modern
Penetration Testing Lab with Generative AI Chapter 3: GenAI-Driven
Reconnaissance for Effective Penetration Testing Chapter 4: GenAI-Enhanced
Scanning and Sniffing Chapter 5: Vulnerability Assessment: Tools,
Techniques, and GenAI Integration Chapter 6: AI-Driven Social Engineering
and Penetration Testing Chapter 7: GenAI Driven Exploitation Testing
Techniques Chapter 8: Post-Exploitation Techniques and AI-Driven Privilege
Escalation Chapter 9: GenAI for Automating and Enhancing Penetration
Testing Reports
Preface About the Author Chapter 1: Foundations of Pentesting:
Methodologies, Frameworks, and AI Integration Chapter 2: Building a Modern
Penetration Testing Lab with Generative AI Chapter 3: GenAI-Driven
Reconnaissance for Effective Penetration Testing Chapter 4: GenAI-Enhanced
Scanning and Sniffing Chapter 5: Vulnerability Assessment: Tools,
Techniques, and GenAI Integration Chapter 6: AI-Driven Social Engineering
and Penetration Testing Chapter 7: GenAI Driven Exploitation Testing
Techniques Chapter 8: Post-Exploitation Techniques and AI-Driven Privilege
Escalation Chapter 9: GenAI for Automating and Enhancing Penetration
Testing Reports
Methodologies, Frameworks, and AI Integration Chapter 2: Building a Modern
Penetration Testing Lab with Generative AI Chapter 3: GenAI-Driven
Reconnaissance for Effective Penetration Testing Chapter 4: GenAI-Enhanced
Scanning and Sniffing Chapter 5: Vulnerability Assessment: Tools,
Techniques, and GenAI Integration Chapter 6: AI-Driven Social Engineering
and Penetration Testing Chapter 7: GenAI Driven Exploitation Testing
Techniques Chapter 8: Post-Exploitation Techniques and AI-Driven Privilege
Escalation Chapter 9: GenAI for Automating and Enhancing Penetration
Testing Reports







