The hacker playbook 3 : (Record no. 881)

MARC details
000 -LEADER
fixed length control field 03261nam a22003497a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230526220326.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 210824s2018 xx a|||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781980901754
Qualifying information paperback
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaTKH
Language of cataloging eng
Transcribing agency EG-CaTKH
Description conventions rda
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
Item number K56 2018
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8 KI.H 2018
Edition number 23
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Kim, Peter,
Relator term author.
245 10 - TITLE STATEMENT
Title The hacker playbook 3 :
Remainder of title Practical guide to penetration testing /
Statement of responsibility, etc. Peter Kim.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture [place of publication not identified] :
Name of producer, publisher, distributor, manufacturer Secure Planet LLC,
Date of production, publication, distribution, manufacture, or copyright notice 2018.
300 ## - PHYSICAL DESCRIPTION
Extent ix, 271 pages :
Other physical details illustrations ;
Dimensions 26 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
Content type code txt
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
Media type code n
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
Carrier type code nc
500 ## - GENERAL NOTE
General note <br/>
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Introduction -- Pregame : the setup -- Before the snap : red team recon -- The throw : web application exploitation -- The drive : compromising the network -- The screen : social engineering -- The onside kick : physical attacks -- The quarterback sneak : evading AV and network detection -- Special teams : cracking, exploits, and tricks -- Two-minute drill : from zero to hero.
520 ## - SUMMARY, ETC.
Summary, etc. "Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ask ourselves is, are all the safeguards we are putting in place working? This is what The Hacker Playbook 3 - Red Team Edition is all about. By now, we are all familiar with penetration testing, but what exactly is a Red Team? Red Teams simulate real-world, advanced attacks to test how well your organization's defensive teams respond if you were breached. They find the answers to questions like: Do your incident response teams have the right tools, skill sets, and people to detect and mitigate these attacks? How long would it take them to perform these tasks and is it adequate? This is where you, as a Red Teamer, come in to accurately test and validate the overall security program. THP3 will take your offensive hacking skills, thought processes, and attack paths to the next level. This book focuses on real-world campaigns and attacks, exposing you to different initial entry points, exploitation, custom malware, persistence, and lateral movement--all without getting caught! This heavily lab-based book will include multiple Virtual Machines, testing environments, and custom THP tools."--Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Penetration testing (Computer security)
General subdivision Handbooks, manuals, etc.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software
General subdivision Testing.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer crimes
General subdivision Prevention.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Hackers.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer programming.
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name huda.mahmoud
Cataloging process M
First Date, FD (RLIN) 2022026
998 ## - LOCAL CONTROL INFORMATION (RLIN)
Cataloger's name mona.romia
Cataloging process R
First Date, FD (RLIN) 20220207
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Home library Current library Date acquired Cost, normal purchase price Total Checkouts Full call number Barcode Date last seen Cost, replacement price Price effective from Koha item type
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 08/24/2021 409.03   005.8 KI.T 2018 210066 08/24/2021 409.03 08/24/2021 Books
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 08/24/2021 409.03   005.8 KI.T 2018 210067 08/24/2021 409.03 08/24/2021 Books
    Dewey Decimal Classification     Computing The Knowledge Hub Library The Knowledge Hub Library 09/07/2021 409.03   005.8 KI.T 2018 193030 09/07/2021 409.03 09/07/2021 Books