The Hacker Playbook 2: Practical Guide To Penetration Testing / Libristo.pl
The Hacker Playbook 2: Practical Guide To Penetration Testing

Code: 09931995

The Hacker Playbook 2: Practical Guide To Penetration Testing

by Peter Kim

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Writte ... more


Out of stock

Availability alert

Add to wishlist

You might also like

Availability alert

Availability alert


Your agreement - Submiting you agree to the Terms and Condtions.

We will watch availability for you

Enter your e-mail address and once book will be available,
we will send you a message. It's that simple.

More about The Hacker Playbook 2: Practical Guide To Penetration Testing

Book synopsis

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code. Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

Book details

Book category Books in English Computing & information technology Computer networking & communications Network security

Trending among others


Books by language

250 000
safisfied customers

Since 2008, we have served long line of book lovers, but each of them was always on the first place.


Paczkomat 12,99 ZŁ 31975 punktów

Copyright! ©2008-24 libristo.pl All rights reservedPrivacyPoučení o cookies


Account: Log in
Wszystkie książki świata w jednym miejscu. I co więcej w super cenach.

Shopping cart ( Empty )

For free shipping
shop for 299 zł and more

You are here: