Only last month, unidentified hackers launched an attack on the network used by the White House Military Office. Whilst there is no indication that any data was compromised – can you afford to run that risk? “The person given the responsibility to protect a system should know the nature and techniques of the enemy, and be able to prevent successful attacks by discovering and securing any vulnerabilities in their systems or networks before the adversary can find them”. Kevin M. Henry Author of Penetration Testing: Protecting Networks and Systems.
|Testing is the key to providing assurance of the correct implementation and operation of technology. If you are looking for information on the various types of penetration tests, the tools commonly used and the ways to leverage a pen test to the greatest benefit to the organisation – look no further than “Penetration Testing: Protecting Networks and Systems”. Author, Kevin Henry, draws on his wealth of experience and provides real-world examples to illustrate the most common pitfalls that can be encountered during both the testing phase, and, when delivering the final report.|
Better defend your systems, intellectual property and values with this essential guide!