NLU Meghalaya Library

Online Public Access Catalogue (OPAC)

Hands-On Ethical Hacking Tactics. (Record no. 15061)

MARC details
000 -LEADER
fixed length control field 03610nam a2200277uu 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250710181503.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250616s||||||||||||||||o||||||||||| |d
024 80 - OTHER STANDARD IDENTIFIER
Standard number or code 9781801818650
040 ## - CATALOGING SOURCE
Original cataloging agency PACKT
Transcribing agency PACKT
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title en
044 ## - COUNTRY OF PUBLISHING/PRODUCING ENTITY CODE
MARC country code GB
100 0# - MAIN ENTRY--PERSONAL NAME
Personal name Shane Hartman
Relator term author.
245 00 - TITLE STATEMENT
Title Hands-On Ethical Hacking Tactics.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. GB:
Name of publisher, distributor, etc. Packt,
Date of publication, distribution, etc. 2024-05-17.
263 ## - PROJECTED PUBLICATION DATE
Projected publication date 2024-05-17
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture GB:
Name of producer, publisher, distributor, manufacturer Packt,
300 ## - PHYSICAL DESCRIPTION
Extent 464.
377 ## - ASSOCIATED LANGUAGE
Language code en
520 ## - SUMMARY, ETC.
Summary, etc. <p><b>Detect and mitigate diverse cyber threats with actionable insights into attacker types, techniques, and efficient cyber threat hunting</b></p><h4>Key Features</h4><ul><li>Explore essential tools and techniques to ethically penetrate and safeguard digital environments</li><li>Set up a malware lab and learn how to detect malicious code running on the network</li><li>Understand different attacker types, their profiles, and mindset, to enhance your cyber defense plan</li><li>Purchase of the print or Kindle book includes a free PDF eBook</li></ul><h4>Book Description</h4>If you’re an ethical hacker looking to boost your digital defenses and stay up to date with the evolving cybersecurity landscape, then this book is for you. Hands-On Ethical Hacking Tactics is a comprehensive guide that will take you from fundamental to advanced levels of ethical hacking, offering insights into both offensive and defensive techniques. Written by a seasoned professional with 20+ years of experience, this book covers attack tools, methodologies, and procedures, helping you enhance your skills in securing and defending networks.<br/>The book starts with foundational concepts such as footprinting, reconnaissance, scanning, enumeration, vulnerability assessment, and threat modeling. Next, you’ll progress to using specific tools and procedures for hacking Windows, Unix, web servers, applications, and databases. The book also gets you up to speed with malware analysis. Throughout the book, you’ll experience a smooth transition from theoretical concepts to hands-on techniques using various platforms. Finally, you’ll explore incident response, threat hunting, social engineering, IoT hacking, and cloud exploitation, which will help you address the complex aspects of ethical hacking.<br/>By the end of this book, you’ll have gained the skills you need to navigate the ever-changing world of cybersecurity.<h4>What you will learn</h4><ul><li>Understand the core concepts and principles of ethical hacking</li><li>Gain hands-on experience through dedicated labs</li><li>Explore how attackers leverage computer systems in the digital landscape</li><li>Discover essential defensive technologies to detect and mitigate cyber threats</li><li>Master the use of scanning and enumeration tools</li><li>Understand how to hunt and use search information to identify attacks</li></ul><h4>Who this book is for</h4>Hands-On Ethical Hacking Tactics is for penetration testers, ethical hackers, and cybersecurity enthusiasts looking to explore attack tools, methodologies, and procedures relevant to today's cybersecurity landscape. This ethical hacking book is suitable for a broad audience with varying levels of expertise in cybersecurity, whether you're a student or a professional looking for job opportunities, or just someone curious about the field.
538 ## - SYSTEM DETAILS NOTE
System details note Data in extended ASCII character set.
538 ## - SYSTEM DETAILS NOTE
System details note Mode of access: Internet.
700 0# - ADDED ENTRY--PERSONAL NAME
Personal name Ken Dunham
Relator term author.
710 2# - ADDED ENTRY--CORPORATE NAME
Corporate name or jurisdiction name as entry element PACKT
773 0# - HOST ITEM ENTRY
Title Hands-On Ethical Hacking Tactics
Place, publisher, and date of publication GB,Packt,2024-05-17
Physical description 464
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://learning.packt.com/product/472412">https://learning.packt.com/product/472412</a>

No items available.