000 01902cam a2200277 i 4500
008 170814n2015 af 000 0 eng u
020 _a9781512214567
_q(paperback)
035 _a(Sirsi) a782
082 0 0 _a005.80287
100 1 _aKim, Peter
_e, author
_95360
245 1 4 _aThe hacker playbook 2
_b: practical guide to penetration testing
_c\ Peter Kim.
264 1 _aNorth Charleston, South Carolina :
_bSecure Planet, LLC.
_c, 2015.
300 _axiv, 339 pages :
_billustrations
_c; 26 cm.
336 _atext
_btxt
_2rdacontent
337 _aunmediated
_bn
_2rdamedia
338 _avolume
_bnc
_2rdacarrier
505 0 _a Pregame -- The Setup; Building your penetration testing box; Before the snap : scanning the network; The drive : exploiting scanner findings; The throw : manual web application findings; The lateral pass : moving through the network; The screen : social engineering; The onside kick : attacks that require physical access; The quarterback sneak : evading AV; Special teams : cracking, exploits, tricks; Two-minute drill -- from zero to hero; Post game analysis : reporting; Continuing education
520 3 _aJust as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field.
596 _a1 3
650 0 _aComputer crimes
_xPrevention.
_95361
650 0 _aComputer networks
_xSecurity measures.
_91411
650 0 _aComputer programming.
_91137
650 0 _aComputer software
_xTesting
_95362
650 0 _aHackers.
_93256
650 0 _aPenetration testing (Computer security)
_vHandbooks, manuals, etc.
_95363
999 _c1591
_d1591