Hands on hacking / (Record no. 77153)

000 -LEADER
fixed length control field 14068nam a22003737a 4500
003 - CONTROL NUMBER IDENTIFIER
control field CITU
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20230211111055.0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr an aaaaa
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 211006b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119561453
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781119561507
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title eng
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.87
Edition number 20
100 1# - MAIN ENTRY--PERSONAL NAME
Preferred name for the person Hickey, Matthew.
Relator term author
245 ## - TITLE STATEMENT
Title Hands on hacking /
Statement of responsibility, etc Matthew Hickey with Jennifer Arcuri.
264 #1 - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Indianapolis :
Name of publisher, distributor, etc Wiley,
Date of publication, distribution, etc 2020.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource, (608 pages) :
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
Content type code txt
337 ## - MEDIA TYPE
Source rdamedia
Media type term computer
Media type code c
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term online resource
Carrier type code cr
500 ## - GENERAL NOTE
General note <br/><br/><br/><br/><br/><br/><br/><br/><br/><br/>ABOUT THE AUTHOR<br/>MATTHEW HICKEY is an expert in offensive security testing, discovering vulnerabilities used by malicious attackers, as well as a developer of exploits and security testing tools. He is a co-founder of Hacker House.<br/><br/>JENNIFER ARCURI is an entrepreneur, public speaker and Certified Ethical Hacker. She is the CEO and founder of Hacker House.
501 ## - WITH NOTE
With note Includes index.
520 ## - SUMMARY, ETC.
Summary, etc DESCRIPTION<br/>A fast, hands-on introduction to offensive hacking techniques<br/><br/>Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike.<br/><br/>We will take you on a journey through a hacker’s perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you’ll look for flaws and their known exploits—including tools developed by real-world government financed state-actors.<br/><br/>An introduction to the same hacking techniques that malicious hackers will use against an organization<br/>Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws<br/>Based on the tried and tested material used to train hackers all over the world in the art of breaching networks<br/>Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities<br/>We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security.<br/><br/>Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Hacking.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Hacking
General subdivision Moral and ethical aspects.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Penetration testing (Computer security).
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
General subdivision Network security.
655 #0 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Electronic books.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Arcuri, Jennifer.
Relator term author
856 ## - ELECTRONIC LOCATION AND ACCESS
Link text Full text available at Wiley Online Library Click here to view
Uniform Resource Identifier https://onlinelibrary.wiley.com/doi/book/10.1002/9781119561507
942 ## - ADDED ENTRY ELEMENTS
Source of classification or shelving scheme
Item type EBOOK
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent Location Current Location Date acquired Source of acquisition Inventory number Full call number Barcode Date last seen Price effective from Item type
          COLLEGE LIBRARY COLLEGE LIBRARY 2021-10-06 ALBASA 50799 005.87 H526 2020 CL-50799 2021-10-06 2021-10-06 EBOOK