Search by title, author or ISBN

The Hacker Playbook 2: Practical Guide To Penetration Testing: Volume 2

The Hacker Playbook 2: Practical Guide To Penetration Testing: Volume 2 by Peter Kim, ISBN: 9781512214567
Add an alert Add to a list

Add a alert

Enter prices below and click 'Add'. You will receive an alert when the book is available for less than the new or used price you specify.

Alert if:
Close

Add this book to a list

You can add this book to any one of your lists. Just select the list below, and click 'Add'.

Close
ISBN: 9781512214567
Publisher: CreateSpace Independent Publishing Platform
Published: 20 June, 2015
Format: Paperback
Language: English

Please describe the issue

If you have noticed an incorrect price, image or just something you'd like to tell us, enter it below. Please include your email address if you'd like a reply.

The Hacker Playbook 2: Practical Guide To Penetration Testing: Volume 2

Just as a professional athlete doesn't show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the "game" of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style "plays," this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing-including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software. From "Pregame" research to "The Drive" and "The Lateral Pass," the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code. Whether you're downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker's library-so there's no reason not to get in the game.

NEW ITEMS
Prices in $AUD ( Prices updated . )
Retailer Price Delivery Availability Total
BOOKO IS FINDING THE BEST PRICES FOR YOU.
WON'T BE A JIFFY...
USED ITEMS
Prices in $AUD
Retailer Price Delivery Availability Total
BOOKO IS FINDING THE BEST PRICES FOR YOU.
WON'T BE A JIFFY...
Booko is reader-supported. When you buy through links on our site, we may earn an affiliate commission. Learn more

Historical Prices

Loading...
This graph is for informational purposes only. Occasionally pricing data is captured incorrectly, through bugs in Booko or the stores supplying data, which may distort the graph, providing undue hope that even lower prices sometimes appear.

Recently Updated