IT-eBooks.directory Facebook Icon Image IT-eBooks.directory Google Plus Icon Image IT-eBooks.directory Twitter Icon Image
IT-eBooks.directory Logo Image

The Hacker Playbook 2

Practical Guide to Penetration Testing

The Hacker Playbook 2 Image

Book details:

Publisher:CreateSpace Independent Publishing Platform
Categories: CreateSpace , Practical
Author:
Edition:1
ISBN-10:1512214566
ISBN-13:9781512214567
Pages:339
Published:
Posted:Jul 19 2016
Language:English
Book format:PDF
Book size:23.21 MB

Book Description:

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. "The Hacker Playbook" provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing-including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. From "Pregame" research to "The Drive" and "The Lateral Pass," the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. This second version of "The Hacker Playbook" takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code. Whether you're downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker's library-so there's no reason not to get in the game.

Download Link:

Related Books:

The Hacker Playbook Image

The Hacker Playbook

Jun 30 2016 Just as a professional athlete doesnt show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the game of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style plays, this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing - including atta...

The Hacker's Handbook Image

The Hacker's Handbook

Jun 30 2016 The Hackers Handbook: The Strategy Behind Breaking Into and Defending Networks, moves ahead of the pack of books about digital security by revealing the technical aspects of hacking that are least understood by network administrators. This is accomplished by analyzing subjects through a hacking/security dichotomy that details hacking maneuvers and defenses in the same context. Chapters are organized around specific technical components and administrative tasks, providing theoretical background that prepares network defenders for the always-changing and creative tools and techniques of intruder...

Insider Attack and Cyber Security Image

Insider Attack and Cyber Security

Jun 30 2016 This book defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The workshop was a joint effort from the Information Security Departments of Columbia University and Dartmouth College. The book sets an agenda for an ongoing research initiative to solve one of the most vexing problems encountered in security, and a range of topics from critical IT infrastructure to insider threats. In some ways, the insider problem is the ultimate security problem....

The ThoughtWorks Anthology 2 Image

The ThoughtWorks Anthology 2

Jun 30 2016 When you hit a rough spot in software development, it's nice to know that someone has been there before. The domain experts at ThoughtWorks share what they've learned in this anthology, bringing together the best field-tested insights in IT and software development. You'll benefit from their experience in areas from testing to information visualization, from object oriented to functional programming, from incremental development to driving innovation in delivery. You'll find yourself referring to this collection of solved problems whenever you need an expert's insight. This new collection of e...

IT-eBooks.directory