19.04.2013 Views

2KKUU7ita

2KKUU7ita

2KKUU7ita

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

In this part . . .<br />

W ell, here’s the end of the road, so to speak. In this<br />

part, I’ve compiled top-ten lists of what I believe<br />

are the absolute critical success factors to make ethical<br />

hacking — and information security in general — work in<br />

any organization. Bookmark, dog-ear, or do whatever you<br />

need to do with these pages so you can refer to them over<br />

and over again. This is the meat of what you need to know<br />

about information security, compliance, and managing<br />

information risks — even more so than the technical<br />

hacks and countermeasures I’ve covered thus far. Read it,<br />

study it, and make it happen. You can do it!<br />

In addition, the Appendix contains a listing of my favorite<br />

ethical hacking tools and resources that I’ve covered,<br />

broken down into various categories for easy reference.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!