000 | 01902cam a2200277 i 4500 | ||
---|---|---|---|
008 | 170814n2015 af 000 0 eng u | ||
020 |
_a9781512214567 _q(paperback) |
||
035 | _a(Sirsi) a782 | ||
082 | 0 | 0 | _a005.80287 |
100 | 1 |
_aKim, Peter _e, author _95360 |
|
245 | 1 | 4 |
_aThe hacker playbook 2 _b: practical guide to penetration testing _c\ Peter Kim. |
264 | 1 |
_aNorth Charleston, South Carolina : _bSecure Planet, LLC. _c, 2015. |
|
300 |
_axiv, 339 pages : _billustrations _c; 26 cm. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_aunmediated _bn _2rdamedia |
||
338 |
_avolume _bnc _2rdacarrier |
||
505 | 0 | _a Pregame -- The Setup; Building your penetration testing box; Before the snap : scanning the network; The drive : exploiting scanner findings; The throw : manual web application findings; The lateral pass : moving through the network; The screen : social engineering; The onside kick : attacks that require physical access; The quarterback sneak : evading AV; Special teams : cracking, exploits, tricks; Two-minute drill -- from zero to hero; Post game analysis : reporting; Continuing education | |
520 | 3 | _aJust as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field. | |
596 | _a1 3 | ||
650 | 0 |
_aComputer crimes _xPrevention. _95361 |
|
650 | 0 |
_aComputer networks _xSecurity measures. _91411 |
|
650 | 0 |
_aComputer programming. _91137 |
|
650 | 0 |
_aComputer software _xTesting _95362 |
|
650 | 0 |
_aHackers. _93256 |
|
650 | 0 |
_aPenetration testing (Computer security) _vHandbooks, manuals, etc. _95363 |
|
999 |
_c1591 _d1591 |