| 000 -LEADER |
| fixed length control field |
14068nam a22003737a 4500 |
| 003 - CONTROL NUMBER IDENTIFIER |
| control field |
CITU |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20230211111055.0 |
| 007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
| fixed length control field |
cr an aaaaa |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
211006b ||||| |||| 00| 0 eng d |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781119561453 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781119561507 |
| 041 ## - LANGUAGE CODE |
| Language code of text/sound track or separate title |
eng |
| 082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.87 |
| Edition number |
20 |
| 100 1# - MAIN ENTRY--PERSONAL NAME |
| Preferred name for the person |
Hickey, Matthew. |
| Relator term |
author |
| 245 ## - TITLE STATEMENT |
| Title |
Hands on hacking / |
| Statement of responsibility, etc |
Matthew Hickey with Jennifer Arcuri. |
| 264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Indianapolis : |
| Name of publisher, distributor, etc |
Wiley, |
| Date of publication, distribution, etc |
2020. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
1 online resource, (608 pages) : |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| Content type code |
txt |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
computer |
| Media type code |
c |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
online resource |
| Carrier type code |
cr |
| 500 ## - GENERAL NOTE |
| General note |
<br/><br/><br/><br/><br/><br/><br/><br/><br/><br/>ABOUT THE AUTHOR<br/>MATTHEW HICKEY is an expert in offensive security testing, discovering vulnerabilities used by malicious attackers, as well as a developer of exploits and security testing tools. He is a co-founder of Hacker House.<br/><br/>JENNIFER ARCURI is an entrepreneur, public speaker and Certified Ethical Hacker. She is the CEO and founder of Hacker House. |
| 501 ## - WITH NOTE |
| With note |
Includes index. |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
DESCRIPTION<br/>A fast, hands-on introduction to offensive hacking techniques<br/><br/>Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike.<br/><br/>We will take you on a journey through a hacker’s perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you’ll look for flaws and their known exploits—including tools developed by real-world government financed state-actors.<br/><br/>An introduction to the same hacking techniques that malicious hackers will use against an organization<br/>Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws<br/>Based on the tried and tested material used to train hackers all over the world in the art of breaching networks<br/>Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities<br/>We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security.<br/><br/>Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Hacking. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Hacking |
| General subdivision |
Moral and ethical aspects. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Penetration testing (Computer security). |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security |
| General subdivision |
Network security. |
| 655 #0 - INDEX TERM--GENRE/FORM |
| Genre/form data or focus term |
Electronic books. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Arcuri, Jennifer. |
| Relator term |
author |
| 856 ## - ELECTRONIC LOCATION AND ACCESS |
| Link text |
Full text available at Wiley Online Library Click here to view |
| Uniform Resource Identifier |
https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507 |
| 942 ## - ADDED ENTRY ELEMENTS |
| Source of classification or shelving scheme |
|
| Item type |
EBOOK |