Yassine Maleh

Traditional vs Generative AI Pentesting

A Hands-On Approach to Hacking. 1. Auflage. 314 schwarz-weiße Abbildungen, 299 schwarz-weiße Fotos, 15 schwarz-weiße Zeichnungen, 11 schwarz-weiße Tabellen. Sprache: Englisch.
epub eBook , 316 Seiten
ISBN 1040412874
EAN 9781040412879
Veröffentlicht 26. September 2025
Verlag/Hersteller Taylor & Francis eBooks

Auch erhältlich als:

Taschenbuch
56,00
Gebunden
129,50
59,49 inkl. MwSt.
Sofort Lieferbar (Download)
Teilen
Beschreibung

Traditional vs Generative AI Pentesting: A Hands-On Approach to Hacking explores the evolving landscape of penetration testing, comparing traditional methodologies with the revolutionary impact of Generative AI. This book provides a deep dive into modern hacking techniques, demonstrating how AI-driven tools can enhance reconnaissance, exploitation, and reporting in cybersecurity assessments.
Bridging the gap between manual pentesting and AI automation, this book equips readers with the skills and knowledge to leverage Generative AI for more efficient, adaptive, and intelligent security testing. By blending practical case studies, hands-on exercises, and theoretical insights, it guides cybersecurity professionals, researchers, and students through the next generation of offensive security strategies.
The book offers comprehensive coverage of key topics, including: - Traditional vs AI-Driven Pentesting: Understanding the evolution of security testing methodologies - Building an AI-Powered Pentesting Lab: Leveraging Generative AI tools for reconnaissance and exploitation - GenAI in Social Engineering and Attack Automation: Exploring AI-assisted phishing, deepfake attacks, and deception tactics - Post-Exploitation and Privilege Escalation with AI: Enhancing persistence and lateral movement techniques - Automating Penetration Testing Reports: Utilizing AI for streamlined documentation and risk analysis
This book is an essential resource for ethical hackers, cybersecurity professionals, and academics seeking to explore the transformative role of Generative AI in penetration testing. It provides practical guidance, in-depth analysis, and cutting-edge techniques for mastering AI-driven offensive security.

Portrait

Yassine Maleh is an Associate professor of cybersecurity at Sultan Moulay Slimane University, Morocco, since 2019. He is a double PhD in Cybersecurity and IT Management. He is the founding chair of IEEE Consultant Network Morocco and founding president of the African Research Center of Information Technology & Cybersecurity. He is a former CISO at the National Port Agency between 2012-2019. He is a senior member of IEEE and a member of the International Association of Engineers IAENG and The Machine Intelligence Research Labs. Dr Maleh has made contributions in the fields of information security and privacy, Internet of things security, wireless and constrained networks security. His research interests include information security and privacy, Internet of things, networks security, information system, and IT governance. He has published over than 250 papers (international journals, book chapters and conferences/workshops), 40 edited books, and 6 authored books. He is the editor-in-chief of the International Journal of Information Security and Privacy (IJISP, IF: 0.8), and the International Journal of Smart Security Technologies (IJSST). He serves as an associate editor for IEEE Access, since 2019 (Impact Factor 4.098), the International Journal of Digital Crime and Forensics (IJDCF), and the International Journal of Information Security and Privacy (IJISP). He is a series editor of Advances in Cybersecurity Management, by CRC Taylor & Francis. He was also a guest editor for many special issues with prestigious journals (IEEE transactions on industrial informatics, IEEE Engineering Management Review, Sensors, Big Data Journal). He has served and continues to serve on executive and technical program committees and as a reviewer of numerous international conferences and journals such as Elsevier Ad Hoc Networks, IEEE Network Magazine, IEEE Sensor Journal, ICT Express, and Springer Cluster Computing. He was the General chair and publication chair of many international conferences (BCCA 2019, MLBDACP 19, ICI2C'21, ICACNGC 2022, CCSET'22, IEEE ISC2 2022, ISGTA'24, etc...). He received Publons Top 1% reviewer award for the years 2018 and 2019. He holds numerous certifications demonstrating his knowledge and expertise in the field of cybersecurity from major organisations such as ISC2, Fortinet, CEH, Cisco, IBM, Microsoft, CompTIA and others.

Technik
Dieses eBook wird im epub-Format geliefert und ist mit einem Adobe Kopierschutz (DRM) versehen. Sie können dieses eBook mit allen Geräten lesen, die das epub-Format und den Adobe Kopierschutz (DRM) unterstützen.
Zum Beispiel mit den folgenden Geräten:
• tolino Reader 
Laden Sie das eBook direkt über den Reader-Shop auf dem tolino herunter oder übertragen Sie das eBook auf Ihren tolino mit einer kostenlosen Software wie beispielsweise Adobe Digital Editions. 
• Sony Reader & andere eBook Reader 
Laden Sie das eBook direkt über den Reader-Shop herunter oder übertragen Sie das eBook mit der kostenlosen Software Sony READER FOR PC/Mac oder Adobe Digital Editions auf ein Standard-Lesegeräte mit epub- und Adobe DRM-Unterstützung. 
• Tablets & Smartphones 
Möchten Sie dieses eBook auf Ihrem Smartphone oder Tablet lesen, finden Sie hier unsere kostenlose Lese-App für iPhone/iPad und Android Smartphone/Tablets. 
• PC & Mac 
Lesen Sie das eBook direkt nach dem Herunterladen mit einer kostenlosen Lesesoftware, beispielsweise Adobe Digital Editions, Sony READER FOR PC/Mac oder direkt über Ihre eBook-Bibliothek in Ihrem Konto unter „Meine eBooks“ -„online lesen“.
Schalten Sie das eBook mit Ihrer persönlichen Adobe ID auf bis zu sechs Geräten gleichzeitig frei.
Bitte beachten Sie, dass die Kindle-Geräte das Format nicht unterstützen und dieses eBook somit nicht auf Kindle-Geräten lesbar ist.