The hacker playbook 3 : practical guide to penetration testing / Peter Kim
Material type: TextPublication details: [North Charleston, South Carolina] : Secure Planet LLC, c2018Edition: Red team editionDescription: ix, 271 pages : illustrations ; 26 cmISBN: 9781980901754; 1980901759Subject(s): Penetration testing (Computer security) -- Handbooks, manuals, etc | Computer networks -- Security measures | Computer software -- Testing | Computer crimes -- Prevention | Hackers | Computer programmingGenre/Form: Handbooks and manuals.LOC classification: QA76.9.A25 | K56 2018Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
General Circulation | APU Library Open Shelf | Book | QA76.9.A25 K56 2018 c.1 (Browse shelf (Opens below)) | 1 | Available | 00012985 |
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
QA76.9.A25 J64 2016 c.1 Security controls evaluation, testing, and assessment handbook / | QA76.9 .A25 J64 2020 c.1 Security controls evaluation, testing, and assessment handbook / | QA76.9.A25 K33 2007 c.1 Endpoint security / | QA76.9.A25 K56 2018 c.1 The hacker playbook 3 : practical guide to penetration testing / | QA76.9.A25 K68 2003 c.1 The information systems security officer's guide : | QA76.9.A25 L44 2006 c.1 Computer security basics / | QA76.9.A25 L44 2006 c.2 Computer security basics / |
Introduction -- Pregame : the setup -- Before the Snap : red team recon -- The throw : web application exploitation -- The drive : compromising the network -- The screen : social engineering -- The onside kick : physical attacks -- The quarterback sneak : evading AV and network detection -- Special teams : cracking, exploits, and tricks -- Two-minute drill : from zero to hero
The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ask ourselves is, are all the safeguards we are putting in place working?
There are no comments on this title.