MARC details
000 -LEADER |
fixed length control field |
01902cam a2200277 i 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
170814n2015 af 000 0 eng u |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781512214567 |
Qualifying information |
(paperback) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(Sirsi) a782 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
<a href="005.80287">005.80287</a> |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kim, Peter |
Relator term |
, author |
9 (RLIN) |
5360 |
245 14 - TITLE STATEMENT |
Title |
The hacker playbook 2 |
Remainder of title |
: practical guide to penetration testing |
Statement of responsibility, etc. |
\ Peter Kim. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
North Charleston, South Carolina : |
Name of producer, publisher, distributor, manufacturer |
Secure Planet, LLC. |
Date of production, publication, distribution, manufacture, or copyright notice |
, 2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiv, 339 pages : |
Other physical details |
illustrations |
Dimensions |
; 26 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Pregame -- The Setup; Building your penetration testing box; Before the snap : scanning the network; The drive : exploiting scanner findings; The throw : manual web application findings; The lateral pass : moving through the network; The screen : social engineering; The onside kick : attacks that require physical access; The quarterback sneak : evading AV; Special teams : cracking, exploits, tricks; Two-minute drill -- from zero to hero; Post game analysis : reporting; Continuing education |
520 3# - SUMMARY, ETC. |
Summary, etc. |
Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field. |
596 ## - |
-- |
1 3 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes |
General subdivision |
Prevention. |
9 (RLIN) |
5361 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
1411 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer programming. |
9 (RLIN) |
1137 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer software |
General subdivision |
Testing |
9 (RLIN) |
5362 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Hackers. |
9 (RLIN) |
3256 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Penetration testing (Computer security) |
Form subdivision |
Handbooks, manuals, etc. |
9 (RLIN) |
5363 |