The Hacker Playbook

The Hacker Playbook pdf epub mobi txt 电子书 下载 2025

Peter Kim is the CEO/President of Secure Planet, LLC, a global penetration testing company. He has worked in the security field for almost ten years, and has spent the past seven as a penetration tester. His research has been featured on Wired.com, CNN.com, and various other outlets.

Kim has a wide variety of certifications from Sec+, GCIH, GCWN, GWAPT, GXPN, and GMOB. He spent several years teaching penetration testing and network security at Howard Community College in Maryland, and he is the founder of LETHAL, a local security hackerspace in Santa Monica, California.

You can find out more information about LETHAL at www.meetup/LETHAL, or visit Kim’s blog at Secure Planet: http://www.SecurePla.net.

出版者:CreateSpace Independent Publishing Platform
作者:Peter Kim
出品人:
页数:294
译者:
出版时间:2014-3-13
价格:USD 24.99
装帧:Paperback
isbn号码:9781494932633
丛书系列:
图书标签:
  • 安全 
  • 黑客 
  • CS 
  • 编程 
  • The 
  • Playbook 
  • Linux 
  • Hacker 
  •  
想要找书就要到 图书目录大全
立刻按 ctrl+D收藏本页
你会得到大惊喜!!

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software.

From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

具体描述

读后感

评分

评分

评分

评分

评分

用户评价

评分

分类明晰,工具比较全面,入门不错~

评分

分类明晰,工具比较全面,入门不错~

评分

分类明晰,工具比较全面,入门不错~

评分

分类明晰,工具比较全面,入门不错~

评分

分类明晰,工具比较全面,入门不错~

本站所有内容均为互联网搜索引擎提供的公开搜索信息,本站不存储任何数据与内容,任何内容与数据均与本站无关,如有需要请联系相关搜索引擎包括但不限于百度google,bing,sogou

© 2025 book.wenda123.org All Rights Reserved. 图书目录大全 版权所有