Welcome to UPM Library, Online Public Access Catalogue (OPAC)
Amazon cover image
Image from Amazon.com

The hacker playbook 2 : practical guide to penetration testing \ Peter Kim.

By: Material type: TextTextPublisher: North Charleston, South Carolina : Secure Planet, LLC. , 2015Description: xiv, 339 pages : illustrations ; 26 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781512214567
Subject(s): DDC classification:
  • 005.80287
Contents:
Pregame -- The Setup; Building your penetration testing box; Before the snap : scanning the network; The drive : exploiting scanner findings; The throw : manual web application findings; The lateral pass : moving through the network; The screen : social engineering; The onside kick : attacks that require physical access; The quarterback sneak : evading AV; Special teams : cracking, exploits, tricks; Two-minute drill -- from zero to hero; Post game analysis : reporting; Continuing education
Abstract: Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Text Books Text Books UPM Female Campus Library FR Computer and Cyber Sciences 005.80287 KPH (Browse shelf(Opens below)) C.1 Available BC0000002377
Books Books UPM Female Campus Library STACKS Computer and Cyber Sciences 005.80287 KPH (Browse shelf(Opens below)) C.1 Available BC0000001560
Text Books Text Books UPM Male Campus Library FR Computer and Cyber Sciences 005.80287 KPH (Browse shelf(Opens below)) C.2 Available BC0000002376
Books Books UPM Male Campus Library STACKS Computer and Cyber Sciences 005.80287 KPH (Browse shelf(Opens below)) C.2 Available BC0000001559

Pregame -- The Setup; Building your penetration testing box; Before the snap : scanning the network; The drive : exploiting scanner findings; The throw : manual web application findings; The lateral pass : moving through the network; The screen : social engineering; The onside kick : attacks that require physical access; The quarterback sneak : evading AV; Special teams : cracking, exploits, tricks; Two-minute drill -- from zero to hero; Post game analysis : reporting; Continuing education

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field.

1 3

There are no comments on this title.

to post a comment.

            Visit counter For Websites University of Prince Mugrin - Library

Powered by Koha