000 | 01783nam a22003017a 4500 | ||
---|---|---|---|
003 | APU | ||
005 | 20220823162635.0 | ||
008 | 220215t20182018scua 000 0 eng d | ||
020 | _a9781980901754 | ||
020 | _a1980901759 | ||
040 |
_aYDX _beng _cAPU _dSF |
||
050 | 4 |
_aQA76.9.A25 _bK56 2018 |
|
100 | 1 |
_aKim, Peter, _947845 |
|
245 | 1 | 4 |
_aThe hacker playbook 3 : _bpractical guide to penetration testing / _cPeter Kim |
250 | _aRed team edition | ||
260 |
_a[North Charleston, South Carolina] : _bSecure Planet LLC, _cc2018. |
||
300 |
_aix, 271 pages : _billustrations ; _c26 cm |
||
505 | 0 | _aIntroduction -- Pregame : the setup -- Before the Snap : red team recon -- The throw : web application exploitation -- The drive : compromising the network -- The screen : social engineering -- The onside kick : physical attacks -- The quarterback sneak : evading AV and network detection -- Special teams : cracking, exploits, and tricks -- Two-minute drill : from zero to hero | |
520 | _aThe main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ask ourselves is, are all the safeguards we are putting in place working? | ||
650 | 0 |
_aPenetration testing (Computer security) _vHandbooks, manuals, etc _947846 |
|
650 | 0 |
_aComputer networks _xSecurity measures |
|
650 | 0 |
_aComputer software _xTesting _91819 |
|
650 | 0 |
_aComputer crimes _xPrevention |
|
650 | 0 | _aHackers | |
650 | 0 | _aComputer programming | |
655 | 7 |
_aHandbooks and manuals. _2fast |
|
942 |
_2lcc _cBook |
||
999 |
_c383681 _d383681 |