<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Optimization for Learning and Control</title>
  </titleInfo>
  <name type="personal">
    <namePart>Hansson, Anders</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <name type="personal">
    <namePart>Andersen, Martin S.</namePart>
  </name>
  <typeOfResource>text</typeOfResource>
  <originInfo>
    <place>
      <placeTerm type="code" authority="marccountry">nju</placeTerm>
    </place>
    <place>
      <placeTerm type="text">NewJersey</placeTerm>
    </place>
    <publisher>WILEY</publisher>
    <dateIssued>©2023</dateIssued>
    <dateIssued encoding="marc">2023</dateIssued>
    <edition>First edition.</edition>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <extent>259p.</extent>
  </physicalDescription>
  <abstract>Target, test, analyze, and report on security vulnerabilities with pen testing

Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking. 

Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities.

The different phases of a pen test from pre-engagement to completion
Threat modeling and understanding risk
When to apply vulnerability management vs penetration testing
Ways to keep your pen testing skills sharp, relevant, and at the top of the game
 

Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results!
</abstract>
  <tableOfContents>Contact to Central Library: library@iittp.ac.in</tableOfContents>
  <note type="statement of responsibility">Anders Hansson and Martin Andersen</note>
  <note>Includes index.</note>
  <subject authority="lcsh">
    <topic>System analysis</topic>
    <topic>Mathematics</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Mathematical optimization</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Machine learning</topic>
    <topic>Mathematics</topic>
  </subject>
  <subject authority="lcsh">
    <topic>Signal processing</topic>
    <topic>Mathematics</topic>
  </subject>
  <classification authority="ddc">004.210151</classification>
  <identifier type="isbn"> 9781119577485</identifier>
  <identifier type="isbn"> 9781119577485</identifier>
  <identifier type="uri">https://ieeexplore.ieee.org/servlet/opac?bknumber=10132902</identifier>
  <location>
    <url>https://ieeexplore.ieee.org/servlet/opac?bknumber=10132902</url>
  </location>
  <recordInfo>
    <recordCreationDate encoding="marc">230124</recordCreationDate>
    <recordChangeDate encoding="iso8601">20260226125459.0</recordChangeDate>
  </recordInfo>
</mods>
