Ethical Hacking Workshop (notice n° 77883)
[ vue normale ]
000 -LEADER | |
---|---|
fixed length control field | 03258cam a2200289zu 4500 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | FRCYB88947979 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20250108002625.0 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 250108s2023 fr | o|||||0|0|||eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781804612590 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | FRCYB88947979 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | FR-PaCSA |
Language of cataloging | en |
Transcribing agency | |
Description conventions | rda |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Pillay, Rishalin |
245 01 - TITLE STATEMENT | |
Title | Ethical Hacking Workshop |
Remainder of title | Explore a practical approach to learning and applying ethical hacking techniques for effective cybersecurity |
Statement of responsibility, etc. | ['Pillay, Rishalin', 'Abutheraa, Mohammed'] |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Name of producer, publisher, distributor, manufacturer | Packt Publishing |
Date of production, publication, distribution, manufacture, or copyright notice | 2023 |
300 ## - PHYSICAL DESCRIPTION | |
Extent | p. |
336 ## - CONTENT TYPE | |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type code | c |
Source | rdamdedia |
338 ## - CARRIER TYPE | |
Carrier type code | c |
Source | rdacarrier |
520 ## - SUMMARY, ETC. | |
Summary, etc. | Get a hands-on training and experience in tools, techniques, and best practices for effective ethical hacking to combat cyber threats at any scaleKey FeaturesAdvice on how to use the ethical hacking methodology and thought process to perform a successful ethical hackAn exploration of the various stages of an ethical hack and the tools related to each phaseYou'll get the most out of this book ifYou want to learn more about ethical hackingYou already work as part of a security team, blue team, purple team or as a security analyst — but that’s not a prerequisiteYou want to become familiar with the same skills and tools that potential attackers may use to breach your system and identify security vulnerabilitiesYou have a solid understanding of cloud computing and networkingHands-on exercises at the end of each chapter to ensure you solidify what you’ve learnt and get experience with the toolsBook DescriptionThe Ethical Hacking Workshop will teach you how to perform ethical hacking and provide you with hands-on experience using relevant tools. By exploring the thought process involved in ethical hacking and the various techniques you can use to obtain results, you'll gain a deep understanding of how to leverage these skills effectively. Throughout this book, you'll learn how to conduct a successful ethical hack, how to use the tools correctly, and how to interpret the results to enhance your environment's security. By the end of the book, you'll be well-versed in ethical hacking and equipped with the skills and knowledge necessary to safeguard your enterprise against cyber-attacks.What you will learnThe key differences between encryption algorithms, hashing algorithms and cryptography standardsHow to capture and analyze network trafficBest practices in performing recon in cloudHow to perform scanning techniques and network mappingLeveraging various top tools to perform privilege escalation, lateral movement, and implant backdoorsHow to clear tracks and evade detectionWho this book is forThe book is intended to be read by those who are looking to learn about ethical hacking. Individuals who are part of security teams, blue teams, purple teams and not limited to security analysts will benefit from this book. The readers should have a good understanding of cloud computing and networking |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | |
700 0# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Pillay, Rishalin |
700 0# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Abutheraa, Mohammed |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Access method | Cyberlibris |
Uniform Resource Identifier | <a href="https://international.scholarvox.com/netsen/book/88947979">https://international.scholarvox.com/netsen/book/88947979</a> |
Electronic format type | text/html |
Host name |
Pas d'exemplaire disponible.
Réseaux sociaux