Seminar
Penetracijsko ispitivanje sigurnosti računalnog sustava
Ivan Tomić 0036399500 | FER | ZEMRIS | HOME |

9. Literatura

[1] JAMES S. TILLER: The Ethical Hack (A Framework for Business Value Penetration Testing)

[2] Oreilly: Network Security Assessment 2nd Edition

[3] Syngress: Penetration Testers Open Source Toolkit Volume 2

[4] Sybex: CEH Official Certified Ethical Hacker Review Guide Exam 312-50

[5] McGraw Hill: Gray Hat Hacking 2nd Edition

[6] Syngress: Metasploit toolkit for penetration testing, exploit development and vulnerability research

[7] Penetration Testing – A Systematic Approach by Manish Saindane

[8] Penetration Testing Model - Federal Office for Information Security

[9] John Wack, Miles Tracy, Murugiah Souppaya: Guideline on Network Security Testing

[10] Northcutt, S.; Shenk, J.; Shackleford, D.; Rosenberg, T.; Siles, R.; Manchini, S: Penetration Testing : Assessing Your Overall Security Before Attackers Do - SANS Institute

[11] Conducting a Penetration Test on an Organization – SANS Institute

[12] Metasploit Framework User Guide

[13] Meterpreter Guide

[14] INFIGO - Otkrivanje sigurnosnih propusta fuzzing tehnikom

[15] Andrew J. Bennieston: NMAP - A Stealth Port Scanner

Prethodna
Gore
© 2008 Ivan Tomić