000 | 04902cam a2200721 i 4500 | ||
---|---|---|---|
001 | on1202439391 | ||
003 | OCoLC | ||
005 | 20240523125543.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 201031s2021 inu o 001 0 eng d | ||
040 |
_aYDX _beng _erda _epn _cYDX _dDG1 _dOCLCO _dUKAHL _dN$T _dOCLCF _dEBLCP _dUKMGB _dRECBK _dOCLCO _dTEFOD _dSOE _dOCLCQ _dOCLCO _dSFB _dIEEEE _dOCLCQ _dOCLCO _dOCLCL |
||
015 |
_aGBC0G8073 _2bnb |
||
016 | 7 |
_a019991559 _2Uk |
|
019 |
_a1204134922 _a1206238337 |
||
020 |
_a9781119684367 _q(electronic bk. ; _qoBook) |
||
020 |
_a1119684366 _q(electronic bk. ; _qoBook) |
||
020 |
_a9781119684374 _q(electronic bk.) |
||
020 |
_a1119684374 _q(electronic bk.) |
||
020 |
_a9781119684350 _q(electronic bk.) |
||
020 |
_a1119684358 _q(electronic bk.) |
||
020 | _z1119684307 | ||
020 | _z9781119684305 | ||
024 | 7 |
_a10.1002/9781119684367 _2doi |
|
029 | 1 |
_aAU@ _b000068212989 |
|
029 | 1 |
_aAU@ _b000069791688 |
|
029 | 1 |
_aUKMGB _b019991559 |
|
035 |
_a(OCoLC)1202439391 _z(OCoLC)1204134922 _z(OCoLC)1206238337 |
||
037 |
_a9781119684374 _bWiley |
||
037 |
_a130712B6-CAAB-4F8E-B316-FAB52A3BEB6A _bOverDrive, Inc. _nhttp://www.overdrive.com |
||
037 |
_a9820884 _bIEEE |
||
050 | 4 | _aTK5105.59 | |
082 | 0 | 4 |
_a005.8/7 _223 |
049 | _aMAIN | ||
100 | 1 |
_aWylie, Phillip L., _eauthor. |
|
245 | 1 | 4 |
_aThe pentester blueprint : _bstarting a career as an ethical hacker / _cPhillip L. Wylie, Kim Crawley. |
264 | 1 |
_aIndianapolis, IN : _bJohn Wiley, _c[2021] |
|
264 | 4 | _c�2021 | |
300 | _a1 online resource | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
505 | 0 | _aWhat Is a Pentester? -- Prerequisite Skills -- Education of a Hacker -- Education Resources -- Building a Pentesting Lab -- Certifications and Degrees -- Developing a Plan -- Gaining Experience -- Getting Employed as a Pentester -- The Pentester Blueprint. | |
500 | _aIncludes index. | ||
520 | _aThe Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: -The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems -The development of hacking skills and a hacker mindset -Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study -Which certifications and degrees are most useful for gaining employment as a pentester -How to get experience in the pentesting field, including labs, CTFs, and bug bounties | ||
590 |
_aJohn Wiley and Sons _bWiley Online Library: Complete oBooks |
||
650 | 0 |
_aPenetration testing (Computer security) _xVocational guidance. |
|
650 | 0 |
_aHacking _xVocational guidance. |
|
650 | 6 |
_aTests d'intrusion _xOrientation professionnelle. |
|
650 | 6 |
_aPiratage informatique _xOrientation professionnelle. |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xNetwork Security. _2bisacsh |
|
650 | 7 |
_aHacking _2fast |
|
700 | 1 | _aCrawley, Kim. | |
758 |
_ihas work: _aThe Pentester BluePrint (Text) _1https://id.oclc.org/worldcat/entity/E39PCYb9D8ddJHmGmr8hRGdmMK _4https://id.oclc.org/worldcat/ontology/hasWork |
||
776 | 0 | 8 |
_iPrint version: _z1119684307 _z9781119684305 _w(OCoLC)1146299761 |
856 | 4 | 0 | _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119684367 |
938 |
_aAskews and Holts Library Services _bASKH _nAH37841487 |
||
938 |
_aProQuest Ebook Central _bEBLB _nEBL6380281 |
||
938 |
_aEBSCOhost _bEBSC _n2661331 |
||
938 |
_aRecorded Books, LLC _bRECE _nrbeEB00840950 |
||
938 |
_aYBP Library Services _bYANK _n301703813 |
||
994 |
_a92 _bINLUM |
||
999 |
_c12747 _d12747 |