語系:
繁體中文
English
說明(常見問題)
圖資館首頁
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
The business of hackingcreating, dev...
~
Butler, Michael.
The business of hackingcreating, developing, and maintaining an effective penetration testing team /
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
The business of hackingby Michael Butler, Jacob G. Oakley.
其他題名:
creating, developing, and maintaining an effective penetration testing team /
作者:
Butler, Michael.
其他作者:
Oakley, Jacob G.
出版者:
Berkeley, CA :Apress :2024.
面頁冊數:
xiii, 306 p. :ill., digital ;24 cm.
Contained By:
Springer Nature eBook
標題:
Penetration testing (Computer security)Management.
電子資源:
https://doi.org/10.1007/979-8-8688-0174-7
ISBN:
9798868801747$q(electronic bk.)
The business of hackingcreating, developing, and maintaining an effective penetration testing team /
Butler, Michael.
The business of hacking
creating, developing, and maintaining an effective penetration testing team /[electronic resource] :by Michael Butler, Jacob G. Oakley. - Berkeley, CA :Apress :2024. - xiii, 306 p. :ill., digital ;24 cm.
Chapter 1: Introduction. -Chapter 2: The Capability -- Chapter 3: Finding and Retaining Talent -- Chapter 4: Team Management -- Chapter 5: Operational Management -- Chapter 6: Developing Hackers -- Chapter 7: Understanding Clients -- Chapter 8: Engagement Management and Security -- Chapter 9: Effective Web and Mobile Application Testing -- Chapter 10: Effective Testing in Cloud Environments -- Chapter 11: Effective Network Testing -- Chapter 12: Reporting -- Chapter 13: The Wedge -- Chapter 14: The Cyber Arms Dealer -- Chapter 15: New Frontiers -- Chapter 16: Infinite Cost Benefit.
There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that. The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client's requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience. The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions. What you'll learn How to handle and ongoing develop client relationships in a high end industry Team management and how the offensive security industry comes with its own unique challenges. Experience in other industries does not guarantee success in penetration testing. How to identify, understand, and over-deliver on client expectations. How to staff and develop talent within the team. Marketing opportunities and how to use the pentesting team as a wedge for upsell opportunities. The various structures of services available that they may present to their clients. Who This Book Is For This book is written for anyone curious who is interested in creating a penetration testing team or business. It is also relevant for anyone currently executing such a business and even for those simply participating in the business.
ISBN: 9798868801747$q(electronic bk.)
Standard No.: 10.1007/979-8-8688-0174-7doiSubjects--Topical Terms:
969884
Penetration testing (Computer security)
--Management.
LC Class. No.: QA76.9.A25 / B88 2024
Dewey Class. No.: 005.8
The business of hackingcreating, developing, and maintaining an effective penetration testing team /
LDR
:04043nmm a2200349 a 4500
001
658641
003
DE-He213
005
20240701153734.0
006
m d
007
cr nn 008maaau
008
240923s2024 cau s 0 eng d
020
$a
9798868801747$q(electronic bk.)
020
$a
9798868801730$q(paper)
024
7
$a
10.1007/979-8-8688-0174-7
$2
doi
035
$a
979-8-8688-0174-7
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
$b
B88 2024
072
7
$a
UR
$2
bicssc
072
7
$a
UTN
$2
bicssc
072
7
$a
COM053000
$2
bisacsh
072
7
$a
UR
$2
thema
072
7
$a
UTN
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
B986 2024
100
1
$a
Butler, Michael.
$3
280175
245
1 4
$a
The business of hacking
$h
[electronic resource] :
$b
creating, developing, and maintaining an effective penetration testing team /
$c
by Michael Butler, Jacob G. Oakley.
260
$a
Berkeley, CA :
$b
Apress :
$b
Imprint: Apress,
$c
2024.
300
$a
xiii, 306 p. :
$b
ill., digital ;
$c
24 cm.
505
0
$a
Chapter 1: Introduction. -Chapter 2: The Capability -- Chapter 3: Finding and Retaining Talent -- Chapter 4: Team Management -- Chapter 5: Operational Management -- Chapter 6: Developing Hackers -- Chapter 7: Understanding Clients -- Chapter 8: Engagement Management and Security -- Chapter 9: Effective Web and Mobile Application Testing -- Chapter 10: Effective Testing in Cloud Environments -- Chapter 11: Effective Network Testing -- Chapter 12: Reporting -- Chapter 13: The Wedge -- Chapter 14: The Cyber Arms Dealer -- Chapter 15: New Frontiers -- Chapter 16: Infinite Cost Benefit.
520
$a
There is a plethora of literature on the topic of penetration testing, hacking, and related fields. These books are almost exclusively concerned with the technical execution of penetration testing and occasionally the thought process of the penetration tester themselves. There is little to no literature on the unique challenges presented by creating, developing, and managing a penetration testing team that is both effective and scalable. In addition, there is little to no literature on the subject of developing contractual client relationships, marketing, finding and developing talent, and how to drive penetration test execution to achieve client needs. This book changes all that. The Business of Hacking is a one-of-a-kind book detailing the lessons the authors learned while building penetrating testing teams from the ground up, making them profitable, and constructing management principles that ensure team scalability. You will discover both the challenges you face as you develop your team of offensive security professionals and an understanding of how to overcome them. You will gain an understanding of the client's requirements, how to meet them, and how to surpass them to provide clients with a uniquely professional experience. The authors have spent combined decades working in various aspects of cybersecurity with a focus on offensive cybersecurity. Their experience spans military, government, and commercial industries with most of that time spent in senior leadership positions. What you'll learn How to handle and ongoing develop client relationships in a high end industry Team management and how the offensive security industry comes with its own unique challenges. Experience in other industries does not guarantee success in penetration testing. How to identify, understand, and over-deliver on client expectations. How to staff and develop talent within the team. Marketing opportunities and how to use the pentesting team as a wedge for upsell opportunities. The various structures of services available that they may present to their clients. Who This Book Is For This book is written for anyone curious who is interested in creating a penetration testing team or business. It is also relevant for anyone currently executing such a business and even for those simply participating in the business.
650
0
$a
Penetration testing (Computer security)
$x
Management.
$3
969884
650
0
$a
Hacking.
$3
756286
650
1 4
$a
Data and Information Security.
$3
913130
650
2 4
$a
Computer Crime.
$3
833604
650
2 4
$a
Security Services.
$3
825729
650
2 4
$a
IT Risk Management.
$3
913392
650
2 4
$a
Privacy.
$3
268519
700
1
$a
Oakley, Jacob G.
$3
836824
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer Nature eBook
856
4 0
$u
https://doi.org/10.1007/979-8-8688-0174-7
950
$a
Professional and Applied Computing (SpringerNature-12059)
筆 0 讀者評論
全部
電子館藏
館藏
1 筆 • 頁數 1 •
1
條碼號
館藏地
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
000000237751
電子館藏
1圖書
電子書
EB QA76.9.A25 B986 2024 2024
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
多媒體檔案
https://doi.org/10.1007/979-8-8688-0174-7
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入