By ΠΠΈΠΊΠΈΡΠ° Π‘ΠΊΠ°Π±ΡΠΎΠ²
ΠΠΈΠΊΠΈΡΠ° Π‘ΠΊΠ°Π±ΡΠΎΠ², 2024, Π‘Π΅ΡΠΈΡ: ΠΠΈΠ±Π»ΠΈΠΎΡΠ΅ΠΊΠ° ΠΏΡΠΎΠ³ΡΠ°ΠΌΠΌΠΈΡΡΠ°
ΠΡΠ° ΠΊΠ½ΠΈΠ³Π° ΠΈΡΡΠ»Π΅Π΄ΡΠ΅Ρ ΠΌΠ΅ΡΠΎΠ΄Ρ ΠΎΠ±Ρ ΠΎΠ΄Π° ΡΠΈΡΡΠ΅ΠΌ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΠΈ ΡΠ΅ΡΠ΅Π²ΡΡ ΡΠ΅ΡΠ²ΠΈΡΠΎΠ² ΠΈ ΠΏΡΠΎΠ½ΠΈΠΊΠ½ΠΎΠ²Π΅Π½ΠΈΡ Π² ΠΎΡΠΊΡΡΡΡΠ΅ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΠ΅ ΡΠΈΡΡΠ΅ΠΌΡ. ΠΠ½Π° ΡΠ°ΡΡΠΌΠ°ΡΡΠΈΠ²Π°Π΅Ρ ΠΈΠ½ΡΠΎΡΠΌΠ°ΡΠΈΠΎΠ½Π½ΡΡ Π±Π΅Π·ΠΎΠΏΠ°ΡΠ½ΠΎΡΡΡ ΠΊΠ°ΠΊ Π΄Π²ΡΡΡΠΎΡΠΎΠ½Π½ΠΈΠΉ ΠΏΡΠΎΡΠ΅ΡΡ: Π°ΡΠ΄ΠΈΡ ΠΈ ΠΏΠΎΠΈΡΠΊ ΡΡΠ·Π²ΠΈΠΌΠΎΡΡΠ΅ΠΉ Ρ ΠΎΠ΄Π½ΠΎΠΉ ΡΡΠΎΡΠΎΠ½Ρ, ΠΈ ΡΠ°Π·ΡΠ°Π±ΠΎΡΠΊΠ° Π·Π°ΡΠΈΡΠ½ΡΡ ΠΌΠ΅Ρ Ρ Π΄ΡΡΠ³ΠΎΠΉ. Π’Π΅ΡΡΡ Π½Π° ΠΏΡΠΎΠ½ΠΈΠΊΠ½ΠΎΠ²Π΅Π½ΠΈΠ΅ ΠΏΡΠ΅Π΄ΡΡΠ°Π²Π»Π΅Π½Ρ ΠΊΠ°ΠΊ Π½Π΅ΠΎΡΡΠ΅ΠΌΠ»Π΅ΠΌΠ°Ρ ΡΠ°ΡΡΡ ΠΆΠΈΠ·Π½Π΅Π½Π½ΠΎΠ³ΠΎ ΡΠΈΠΊΠ»Π° ΠΠ’-ΠΈΠ½ΡΡΠ°ΡΡΡΡΠΊΡΡΡΡ Π΄Π»Ρ ΠΎΡΠ΅Π½ΠΊΠΈ ΡΠΈΡΠΊΠΎΠ² ΠΈ Π²ΡΡΠ²Π»Π΅Π½ΠΈΡ ΠΏΡΠΎΠ±Π»Π΅ΠΌ. ΠΠ½ΠΈΠ³Π° ΠΏΠΎΠ΄ΡΠ΅ΡΠΊΠΈΠ²Π°Π΅Ρ Π·Π°ΠΊΠΎΠ½Π½ΠΎΡΡΡ Π²Π·Π»ΠΎΠΌΠ° ΡΠΎΠ»ΡΠΊΠΎ ΠΏΡΠΈ Π½Π°Π»ΠΈΡΠΈΠΈ ΡΠΎΠ³Π»Π°ΡΠ΅Π½ΠΈΡ ΠΈΠ»ΠΈ ΠΏΡΠΈ ΡΠ°Π±ΠΎΡΠ΅ Ρ ΡΠΎΠ±ΡΡΠ²Π΅Π½Π½ΡΠΌΠΈ ΡΠΈΡΡΠ΅ΠΌΠ°ΠΌΠΈ.
Nikita Skabtsov, 2024, Series: Programmer's Library
This book explores methods for bypassing network service security systems and penetrating open information systems. It examines information security as a two-sided process: auditing and vulnerability discovery on one hand, and developing protective measures on the other. Penetration testing is presented as an integral part of an IT infrastructure's lifecycle for risk assessment and problem identification. The book emphasizes the legality of hacking only with proper authorization or when dealing with one's own systems.