000 01783nam a22003017a 4500
003 APU
005 20220823162635.0
008 220215t20182018scua 000 0 eng d
020 _a9781980901754
020 _a1980901759
040 _aYDX
_beng
_cAPU
_dSF
050 4 _aQA76.9.A25
_bK56 2018
100 1 _aKim, Peter,
_947845
245 1 4 _aThe hacker playbook 3 :
_bpractical guide to penetration testing /
_cPeter Kim
250 _aRed team edition
260 _a[North Charleston, South Carolina] :
_bSecure Planet LLC,
_cc2018.
300 _aix, 271 pages :
_billustrations ;
_c26 cm
505 0 _aIntroduction -- Pregame : the setup -- Before the Snap : red team recon -- The throw : web application exploitation -- The drive : compromising the network -- The screen : social engineering -- The onside kick : physical attacks -- The quarterback sneak : evading AV and network detection -- Special teams : cracking, exploits, and tricks -- Two-minute drill : from zero to hero
520 _aThe main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ask ourselves is, are all the safeguards we are putting in place working?
650 0 _aPenetration testing (Computer security)
_vHandbooks, manuals, etc
_947846
650 0 _aComputer networks
_xSecurity measures
650 0 _aComputer software
_xTesting
_91819
650 0 _aComputer crimes
_xPrevention
650 0 _aHackers
650 0 _aComputer programming
655 7 _aHandbooks and manuals.
_2fast
942 _2lcc
_cBook
999 _c383681
_d383681