An Ihren Kindle oder ein anderes Gerät senden

 
 
 

Kostenlos testen

Jetzt kostenlos reinlesen

An Ihren Kindle oder ein anderes Gerät senden

Jeder kann Kindle Bücher lesen  selbst ohne ein Kindle-Gerät  mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.
Der Artikel ist in folgender Variante leider nicht verfügbar
Keine Abbildung vorhanden für
Farbe:
Keine Abbildung vorhanden

 

The Hacker Playbook: Practical Guide To Penetration Testing (English Edition) [Kindle Edition]

Peter Kim
5.0 von 5 Sternen  Alle Rezensionen anzeigen (1 Kundenrezension)

Kindle-Preis: EUR 11,10 Inkl. MwSt. und kostenloser drahtloser Lieferung über Amazon Whispernet

Weitere Ausgaben

Amazon-Preis Neu ab Gebraucht ab
Kindle Edition EUR 11,10  
Taschenbuch EUR 19,31  


Produktbeschreibungen

Kurzbeschreibung

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.


Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software.


From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.


Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

Über den Autor und weitere Mitwirkende

Peter Kim is the CEO/President of Secure Planet, LLC, a global penetration testing company. He has worked in the security field for almost ten years, and has spent the past seven as a penetration tester. His research has been featured on Wired.com, CNN.com, and various other outlets.

Kim has a wide variety of certifications from Sec+, GCIH, GCWN, GWAPT, GXPN, and GMOB. He spent several years teaching penetration testing and network security at Howard Community College in Maryland, and he is the founder of LETHAL, a local security hackerspace in Santa Monica, California.

You can find out more information about LETHAL at www.meetup/LETHAL, or visit Kim’s blog at Secure Planet: http://www.SecurePla.net.


Produktinformation


Mehr über den Autor

Entdecken Sie Bücher, lesen Sie über Autoren und mehr

Welche anderen Artikel kaufen Kunden, nachdem sie diesen Artikel angesehen haben?


Kundenrezensionen

4 Sterne
0
3 Sterne
0
2 Sterne
0
1 Sterne
0
5.0 von 5 Sternen
5.0 von 5 Sternen
Die hilfreichsten Kundenrezensionen
0 von 1 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Aus der Praxis für die Praxis 30. August 2014
Von ALBERT
Format:Kindle Edition|Verifizierter Kauf
Der Autor ist Hacker und gibt seine Erfahrungen weiter. Schön das hier bereits auf Kali Linux eingegangen wird. Die Nutzung der Tools wird gut erklärt
War diese Rezension für Sie hilfreich?
Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)
Amazon.com: 4.8 von 5 Sternen  44 Rezensionen
24 von 25 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen A Playbook To Keep In Your Huddle 17. März 2014
Von Devin - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
I have been a Pentester for over 10 years so when I read The Hacker Playbook I wasn't expecting much difference from the previous books I have read. After finishing the book I was pleasantly surprised to find this is a true playbook. This book covers a pentest from the beginning to the end covering go to techniques to some new ones. This book will be by my side during my next pentest to help me navigate any binds I get in or techniques I forget about.
17 von 18 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Like reading through my own playbook 26. März 2014
Von InfoSecGeek - Veröffentlicht auf Amazon.com
Format:Kindle Edition|Verifizierter Kauf
Stumbled across this book by accident and have to say that it is a gem. A fantastic book - no fluff here and certainly not like the rest of the books out there on the subject where you find the same high-level info that really doesn't apply to a pentest today. Only 1 or 2 things in this book that I don't already use in my own pentests, which was quite surprising considering that, until now, I hadn't come across a single book with these techniques - techniques that I can profess to use daily in my line of work.

By no means is this book an exhaustive look at penetration testing techniques, but it most certainly includes material that will get you the 'keys to the kingdom' on your target environment 90% of the time [personal experience]. Highly recommend this book for professionals just starting out in the field as well as for any veterans who may have received their penetration testing training from 'traditional' sources.
13 von 14 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Great learning resources for starters 24. März 2014
Von kevin bang - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
As an aspiring penetration tester, the knowledge gained from reading this book has been tremendous. From start to finish, it provides a thorough guide into how an experienced pentester moves through an assessment efficiently and methodologically. The knowledge found in this book have been a great learning resource for me. With much of the tactics found in the book being new to me, I have found that it provides a valuable learning experience to practice and get familiar with the tools and methods before utilizing them in real world tests. While other books I have read to get started in the pentesting field have been rather basic, the author goes in depth on the most relevant tools and procedures that I feel can take me to the next level. This book has been a great read and definitely one to keep for reference. Highly recommended!
10 von 12 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen If you want to build a Pen testing lab this is the book! 16. Mai 2014
Von David Scott - Veröffentlicht auf Amazon.com
Format:Taschenbuch|Verifizierter Kauf
This is what I call the new Holy Grail for building a Pen testing lab.

It’s current and based around Kali Linux; the author easily talks you step by step through getting started!

If you’re new (and most likely you are) forget every other book and get this first!

I can't promise you a speaking spot at DEFCON, but it will get you going in the right direction. Who knows with some practice you might even give the NSA a run for there money!
7 von 8 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Exactly the kind of thing we need more of! 29. Mai 2014
Von Justin Tharpe - Veröffentlicht auf Amazon.com
Format:Kindle Edition|Verifizierter Kauf
This book hit the nail on the head for me. A lot of it just re affirmed what I already do, but gave me some different ideas on how to approach the same scenarios. I would say this is not a book for the beginner that wants to read one book and dive into attacking boxes, but if they want to start our with some theory and start to build a sold base of knowledge I would say this is a great place to start! Hoping Peter Kim will write another book I will definitely be buying it!
Waren diese Rezensionen hilfreich?   Wir wollen von Ihnen hören.
Kundenrezensionen suchen
Nur in den Rezensionen zu diesem Produkt suchen

Kunden diskutieren

Das Forum zu diesem Produkt
Diskussion Antworten Jüngster Beitrag
Noch keine Diskussionen

Fragen stellen, Meinungen austauschen, Einblicke gewinnen
Neue Diskussion starten
Thema:
Erster Beitrag:
Eingabe des Log-ins
 

Kundendiskussionen durchsuchen
Alle Amazon-Diskussionen durchsuchen
   


Ähnliche Artikel finden