Facebook Twitter Pinterest <Einbetten>
EUR 19,31
  • Alle Preisangaben inkl. MwSt.
Auf Lager.
Verkauf und Versand durch Amazon. Geschenkverpackung verfügbar.
The Hacker Playbook: Prac... ist in Ihrem Einkaufwagen hinzugefügt worden
Möchten Sie verkaufen?
Zur Rückseite klappen Zur Vorderseite klappen
Hörprobe Wird gespielt... Angehalten   Sie hören eine Hörprobe des Audible Hörbuch-Downloads.
Mehr erfahren
Alle 4 Bilder anzeigen

The Hacker Playbook: Practical Guide To Penetration Testing (Englisch) Taschenbuch – 13. März 2014

5.0 von 5 Sternen 1 Kundenrezension

Alle Formate und Ausgaben anzeigen Andere Formate und Ausgaben ausblenden
Neu ab Gebraucht ab
Kindle Edition
"Bitte wiederholen"
"Bitte wiederholen"
EUR 19,31
EUR 18,65 EUR 15,99
10 neu ab EUR 18,65 3 gebraucht ab EUR 15,99

Dieses Buch gibt es in einer neuen Auflage:

click to open popover

Wird oft zusammen gekauft

  • The Hacker Playbook: Practical Guide To Penetration Testing
  • +
  • Rtfm: Red Team Field Manual
  • +
  • The Hacker Playbook 2: Practical Guide To Penetration Testing
Gesamtpreis: EUR 44,96
Die ausgewählten Artikel zusammen kaufen

Es wird kein Kindle Gerät benötigt. Laden Sie eine der kostenlosen Kindle Apps herunter und beginnen Sie, Kindle-Bücher auf Ihrem Smartphone, Tablet und Computer zu lesen.

  • Apple
  • Android
  • Windows Phone

Geben Sie Ihre Mobiltelefonnummer ein, um die kostenfreie App zu beziehen.

Jeder kann Kindle Bücher lesen — selbst ohne ein Kindle-Gerät — mit der KOSTENFREIEN Kindle App für Smartphones, Tablets und Computer.



Über den Autor und weitere Mitwirkende

Peter Kim is the CEO/President of Secure Planet, LLC, a global penetration testing company. He has worked in the security field for almost ten years, and has spent the past seven as a penetration tester. His research has been featured on Wired.com, CNN.com, and various other outlets.

Kim has a wide variety of certifications from Sec+, GCIH, GCWN, GWAPT, GXPN, and GMOB. He spent several years teaching penetration testing and network security at Howard Community College in Maryland, and he is the founder of LETHAL, a local security hackerspace in Santa Monica, California.

You can find out more information about LETHAL at www.meetup/LETHAL, or visit Kim’s blog at Secure Planet: http://www.SecurePla.net.


5.0 von 5 Sternen
5 Sterne
4 Sterne
3 Sterne
2 Sterne
1 Stern
Siehe die Kundenrezension
Sagen Sie Ihre Meinung zu diesem Artikel


Format: Kindle Edition Verifizierter Kauf
Der Autor ist Hacker und gibt seine Erfahrungen weiter. Schön das hier bereits auf Kali Linux eingegangen wird. Die Nutzung der Tools wird gut erklärt
Kommentar 2 Personen fanden diese Informationen hilfreich. War diese Rezension für Sie hilfreich? Ja Nein Feedback senden...
Vielen Dank für Ihr Feedback.
Wir konnten Ihre Stimmabgabe leider nicht speichern. Bitte erneut versuchen
Missbrauch melden

Die hilfreichsten Kundenrezensionen auf Amazon.com (beta)

Amazon.com: 4.5 von 5 Sternen 151 Rezensionen
62 von 67 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen A Playbook To Keep In Your Huddle 17. März 2014
Von Devin - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
I have been a Pentester for over 10 years so when I read The Hacker Playbook I wasn't expecting much difference from the previous books I have read. After finishing the book I was pleasantly surprised to find this is a true playbook. This book covers a pentest from the beginning to the end covering go to techniques to some new ones. This book will be by my side during my next pentest to help me navigate any binds I get in or techniques I forget about.
41 von 43 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Like reading through my own playbook 26. März 2014
Von InfoSecGeek - Veröffentlicht auf Amazon.com
Format: Kindle Edition Verifizierter Kauf
Stumbled across this book by accident and have to say that it is a gem. A fantastic book - no fluff here and certainly not like the rest of the books out there on the subject where you find the same high-level info that really doesn't apply to a pentest today. Only 1 or 2 things in this book that I don't already use in my own pentests, which was quite surprising considering that, until now, I hadn't come across a single book with these techniques - techniques that I can profess to use daily in my line of work.

By no means is this book an exhaustive look at penetration testing techniques, but it most certainly includes material that will get you the 'keys to the kingdom' on your target environment 90% of the time [personal experience]. Highly recommend this book for professionals just starting out in the field as well as for any veterans who may have received their penetration testing training from 'traditional' sources.
52 von 61 Kunden fanden die folgende Rezension hilfreich
3.0 von 5 Sternen Reviews are misleading 17. Mai 2014
Von Kenny - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
This book is a great reference manual, described from the perspectives of a pro. It does not go into details on any subject. Instead it helps the reader to see things in a different perspective. Not recommended for new readers due to the fact that the book starts out with tools, scripts and languages a little higher then beginners level
29 von 35 Kunden fanden die folgende Rezension hilfreich
5.0 von 5 Sternen Great learning resources for starters 24. März 2014
Von #BANG - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
As an aspiring penetration tester, the knowledge gained from reading this book has been tremendous. From start to finish, it provides a thorough guide into how an experienced pentester moves through an assessment efficiently and methodologically. The knowledge found in this book have been a great learning resource for me. With much of the tactics found in the book being new to me, I have found that it provides a valuable learning experience to practice and get familiar with the tools and methods before utilizing them in real world tests. While other books I have read to get started in the pentesting field have been rather basic, the author goes in depth on the most relevant tools and procedures that I feel can take me to the next level. This book has been a great read and definitely one to keep for reference. Highly recommended!
19 von 24 Kunden fanden die folgende Rezension hilfreich
2.0 von 5 Sternen If You Discount The Book's Pictures You’re Left With a Book That is Less Than 50 Pages Long On How To Do Nothing. 18. Mai 2015
Von TheseArmsRSnakes - Veröffentlicht auf Amazon.com
Format: Taschenbuch Verifizierter Kauf
Book is a waste, it is written in the same manner I would expect a lazy college student to write a paper. Please do not buy this book.

The Hacker Playbook is primarily composed of vague GUI pictures, large text, large margins and spacing to give the appearance of content. At the end of the day it’s a very loose narration of how Mr. Kim conducts a Pen Test. This one dimensional narration is not informative, creative, or interestingly written. He managed to cram enough pictures of rubbish to bolster the page count to 274. If you were to remove the pictures you’d be left with less than 50 pages on how to do nothing.

This book is not for individuals looking to understand Pen Testing, or even for those already acquainted. Your time and money is better spent elsewhere. You can't compare the content of a book like this to Metasploit: The Penetration Tester's Guide, or open source documentation alternatives.
Waren diese Rezensionen hilfreich? Wir wollen von Ihnen hören.