Welcome to UPM Library, Online Public Access Catalogue (OPAC)

The hacker playbook 2 (Record no. 1591)

MARC details
000 -LEADER
fixed length control field 01902cam a2200277 i 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 170814n2015 af 000 0 eng u
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781512214567
Qualifying information (paperback)
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) a782
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number <a href="005.80287">005.80287</a>
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kim, Peter
Relator term , author
9 (RLIN) 5360
245 14 - TITLE STATEMENT
Title The hacker playbook 2
Remainder of title : practical guide to penetration testing
Statement of responsibility, etc. \ Peter Kim.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture North Charleston, South Carolina :
Name of producer, publisher, distributor, manufacturer Secure Planet, LLC.
Date of production, publication, distribution, manufacture, or copyright notice , 2015.
300 ## - PHYSICAL DESCRIPTION
Extent xiv, 339 pages :
Other physical details illustrations
Dimensions ; 26 cm.
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term unmediated
Media type code n
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term volume
Carrier type code nc
Source rdacarrier
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Pregame -- The Setup; Building your penetration testing box; Before the snap : scanning the network; The drive : exploiting scanner findings; The throw : manual web application findings; The lateral pass : moving through the network; The screen : social engineering; The onside kick : attacks that require physical access; The quarterback sneak : evading AV; Special teams : cracking, exploits, tricks; Two-minute drill -- from zero to hero; Post game analysis : reporting; Continuing education
520 3# - SUMMARY, ETC.
Summary, etc. Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field.
596 ## -
-- 1 3
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Prevention.
9 (RLIN) 5361
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 1411
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer programming.
9 (RLIN) 1137
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software
General subdivision Testing
9 (RLIN) 5362
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hackers.
9 (RLIN) 3256
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Penetration testing (Computer security)
Form subdivision Handbooks, manuals, etc.
9 (RLIN) 5363
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan College Home library Current library Shelving location Date acquired Full call number Department Total checkouts Call number Barcode Date last seen Copy number Price effective from Koha item type Date last checked out
    Dewey Decimal Classification     Computer and Cyber Sciences UPM Female Campus Library UPM Female Campus Library FR 11/20/2017 FR 005.80287 KPH 2015 C.1 Cyber Security & Forensic Computing   005.80287 KPH BC0000002377 03/10/2024 C.1 03/10/2024 Text Books  
    Dewey Decimal Classification     Computer and Cyber Sciences UPM Female Campus Library UPM Female Campus Library STACKS 08/14/2017 005.80287 KPH 2015 C.1 Cyber Security & Forensic Computing 1 005.80287 KPH BC0000001560   C.1 03/10/2024 Books  
    Dewey Decimal Classification     Computer and Cyber Sciences UPM Male Campus Library UPM Male Campus Library FR 11/20/2017 FR 005.80287 KPH 2015 C.2 Cyber Security & Forensic Computing 6 005.80287 KPH BC0000002376   C.2 03/10/2024 Text Books  
    Dewey Decimal Classification     Computer and Cyber Sciences UPM Male Campus Library UPM Male Campus Library STACKS 08/14/2017 005.80287 KPH 2015 C.2 Cyber Security & Forensic Computing 3 005.80287 KPH BC0000001559   C.2 03/10/2024 Books  

            Visit counter For Websites University of Prince Mugrin - Library

Powered by Koha