MARC details
000 -LEADER |
fixed length control field |
01730cam a2200277 i 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
170814n2018 af 000 0 eng u |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781512214567 |
Qualifying information |
(paperback) |
035 ## - SYSTEM CONTROL NUMBER |
System control number |
(Sirsi) a1460 |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
<a href="005.80287">005.80287</a> |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kim, Peter |
Relator term |
, author |
9 (RLIN) |
5360 |
245 14 - TITLE STATEMENT |
Title |
The hacker playbook 3 |
Remainder of title |
: practical guide to penetration testing |
Statement of responsibility, etc. |
\ Peter Kim. |
250 ## - EDITION STATEMENT |
Edition statement |
Red Team Edition. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
North Charleston, South Carolina : |
Name of producer, publisher, distributor, manufacturer |
Secure Planet, LLC. |
Date of production, publication, distribution, manufacture, or copyright notice |
, 2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
ix, 271 pages : |
Other physical details |
illustrations |
Dimensions |
; 26 cm. |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
unmediated |
Media type code |
n |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
volume |
Carrier type code |
nc |
Source |
rdacarrier |
520 3# - SUMMARY, ETC. |
Summary, etc. |
Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ask ourselves is, are all the safeguards we are putting in place working? This is what The Hacker Playbook 3 - Red Team Edition is all about |
596 ## - |
-- |
1 3 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer crimes |
General subdivision |
Prevention. |
9 (RLIN) |
5361 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer networks |
General subdivision |
Security measures. |
9 (RLIN) |
1411 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer programming. |
9 (RLIN) |
1137 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer software |
General subdivision |
Testing |
9 (RLIN) |
5362 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Hackers. |
9 (RLIN) |
3256 |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Penetration testing (Computer security) |
Form subdivision |
Handbooks, manuals, etc. |
9 (RLIN) |
5363 |