Goodreads helps you keep track of books you want to read.
Start by marking “Penetration Testing: Procedures and Methodologies” as Want to Read:
Penetration Testing: Procedures and Methodologies
Enlarge cover
Rate this book
Clear rating

Penetration Testing: Procedures and Methodologies

4.0 of 5 stars 4.00  ·  rating details  ·  2 ratings  ·  0 reviews
The Security Analyst Series from EC-Council | Press is comprised of five books covering a broad base of topics in advanced penetration testing and information security analysis. The content of this series is designed to expose the reader to groundbreaking methodologies in conducting thorough information security analysis, as well as advanced penetration testing techniques....more
Paperback, 256 pages
Published May 4th 2010 by Cengage Learning (first published 2010)
more details... edit details

Friend Reviews

To see what your friends thought of this book, please sign up.

Reader Q&A

To ask other readers questions about Penetration Testing, please sign up.

Be the first to ask a question about Penetration Testing

This book is not yet featured on Listopia. Add this book to your favorite list »

Community Reviews

(showing 1-14 of 14)
filter  |  sort: default (?)  |  rating details
Jennifer is currently reading it
Sep 09, 2014
Shari Dunn
Shari Dunn is currently reading it
Aug 04, 2014
Shari Dunn
Shari Dunn is currently reading it
Aug 04, 2014
Richard Apolinario vera
Richard Apolinario vera marked it as to-read
Jun 29, 2014
Madhu marked it as to-read
Dec 11, 2013
Vikas marked it as to-read
Jul 19, 2013
K3nj0 marked it as to-read
Jun 02, 2013
Mindaugas is currently reading it
May 22, 2013
Shekhar Sharma
Shekhar Sharma marked it as to-read
Jun 27, 2012
Ankit marked it as to-read
May 08, 2012
Haroon marked it as to-read
Mar 26, 2012
There are no discussion topics on this book yet. Be the first to start one »
Ethical Hacking Ethical Hacking and Countermeasures: Attack Phases Computer Forensics: Investigating Network Intrusions and Cyber Crime (Ec-Council Press Series: Computer Forensics) Penetration Testing: Network & Perimeter Testing Cyber Safety: Social Networking Cyber Dangers and ID Theft

Share This Book