- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book provides a structured learning path from basic security principles to advanced penetration testing techniques, tailored for both new and experienced cybersecurity practitioners. It is a crucial toolkit for defending against the rising tide of cyber threats.
Andere Kunden interessierten sich auch für
Varin KheraOpen Source Intelligence (OSINT) - A practical Introduction82,99 €
Chris PattenBlack Hat Go25,99 €
Angel R. OteroInformation Technology Control and Audit, Fifth Edition59,99 €
Tom MadsenSecurity Architecture - How & Why137,99 €
Tanya JancaAlice and Bob Learn Application Security46,99 €
Al MarcellaFrom Street-smart to Web-wise®61,99 €
Edward HalibozekThe Manager's Handbook for Corporate Security94,99 €-
-
-
This book provides a structured learning path from basic security principles to advanced penetration testing techniques, tailored for both new and experienced cybersecurity practitioners. It is a crucial toolkit for defending against the rising tide of cyber threats.
Produktdetails
- Produktdetails
- River Publishers Series in Digital Security and Forensics
- Verlag: River Publishers
- Seitenzahl: 272
- Erscheinungstermin: 27. Dezember 2024
- Englisch
- Abmessung: 240mm x 161mm x 19mm
- Gewicht: 574g
- ISBN-13: 9788770046978
- ISBN-10: 8770046972
- Artikelnr.: 71259884
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- River Publishers Series in Digital Security and Forensics
- Verlag: River Publishers
- Seitenzahl: 272
- Erscheinungstermin: 27. Dezember 2024
- Englisch
- Abmessung: 240mm x 161mm x 19mm
- Gewicht: 574g
- ISBN-13: 9788770046978
- ISBN-10: 8770046972
- Artikelnr.: 71259884
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Prof. Yassine Maleh is an Associate professor of cybersecurity and IT governance at Sultan Moulay Slimane University, Morocco, since 2019. He is the founding chair of IEEE Consultant Network Morocco and founding president of the African Research Center of Information Technology & Cybersecurity. He is a former CISO at the National Port Agency between 2012-2019. He is a senior member of IEEE and a member of the International Association of Engineers IAENG and The Machine Intelligence Research Labs. Dr Maleh has made contributions in the fields of information security and privacy, Internet of things security, wireless and constrained networks security. His research interests include information security and privacy, Internet of things, networks security, information system, and IT governance. He has published over than 200 papers (book chapters, international journals, and conferences/workshops), 40 edited books, and 5 authored books. He is the editor-in-chief of the International Journal of Information Security and Privacy (IJISP, IF: 0.8), and the International Journal of Smart Security Technologies (IJSST). He serves as an associate editor for IEEE Access, since 2019 (Impact Factor 4.098), the International Journal of Digital Crime and Forensics (IJDCF), and the International Journal of Information Security and Privacy (IJISP). He is a series editor of Advances in Cybersecurity Management, by CRC Taylor & Francis. He was also a guest editor for many special issues with prestigious journals (IEEE transactions on industrial informatics, IEEE Engineering Management Review, Sensors, Big Data Journal). He has served and continues to serve on executive and technical program committees and as a reviewer of numerous international conferences and journals such as Elsevier Ad Hoc Networks, IEEE Network Magazine, IEEE Sensor Journal, ICT Express, and Springer Cluster Computing. He was the General chair and publication chair of many international conferences (BCCA 2019, MLBDACP 19, ICI2C'21, ICACNGC 2022, CCSET'22, IEEE ISC2 2022, ISGTA'24, etc...). He received Publons Top 1% reviewer award for the years 2018 and 2019. He holds numerous certifications demonstrating his knowledge and expertise in the field of cybersecurity from major organisations such as ISC2, Fortinet, CEH, Cisco, IBM, Microsoft, CompTIA and others.
Preface About the Editor 1.Introduction to Penetration Testing and
Methodologies 2.Understanding Web Application Security 3. Information
Gathering and OSINT for Pentesting 4. Web Vulnerability assessment 5. Web
Applications Pentesting Basics 6. Mastering Web Application Penetration
Testing with Burp Suite 7.Mastering DevSecOps for Web Application
Penetration Testing 8.Insights into Penetration Testing Reports: A
Comprehensive Guide
Methodologies 2.Understanding Web Application Security 3. Information
Gathering and OSINT for Pentesting 4. Web Vulnerability assessment 5. Web
Applications Pentesting Basics 6. Mastering Web Application Penetration
Testing with Burp Suite 7.Mastering DevSecOps for Web Application
Penetration Testing 8.Insights into Penetration Testing Reports: A
Comprehensive Guide
Preface About the Editor 1.Introduction to Penetration Testing and
Methodologies 2.Understanding Web Application Security 3. Information
Gathering and OSINT for Pentesting 4. Web Vulnerability assessment 5. Web
Applications Pentesting Basics 6. Mastering Web Application Penetration
Testing with Burp Suite 7.Mastering DevSecOps for Web Application
Penetration Testing 8.Insights into Penetration Testing Reports: A
Comprehensive Guide
Methodologies 2.Understanding Web Application Security 3. Information
Gathering and OSINT for Pentesting 4. Web Vulnerability assessment 5. Web
Applications Pentesting Basics 6. Mastering Web Application Penetration
Testing with Burp Suite 7.Mastering DevSecOps for Web Application
Penetration Testing 8.Insights into Penetration Testing Reports: A
Comprehensive Guide







