Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Electronic eBook |
Language: | English |
Published: |
Burlington, MA
Syngress/Elsevier
2011
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781597495899/?ar |
Summary: | Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja. |
Item Description: | Includes bibliographical references and index. - Print version record |
Physical Description: | 1 Online-Ressource (xii, 310 pages) illustrations |
ISBN: | 9781597495899 1597495891 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-048584290 | ||
003 | DE-627-1 | ||
005 | 20240228114656.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191206s2011 xx |||||o 00| ||eng c | ||
020 | |a 9781597495899 |c electronic bk. |9 978-1-59749-589-9 | ||
020 | |a 1597495891 |c electronic bk. |9 1-59749-589-1 | ||
035 | |a (DE-627-1)048584290 | ||
035 | |a (DE-599)KEP048584290 | ||
035 | |a (ORHE)9781597495899 | ||
035 | |a (DE-627-1)048584290 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Wilhelm, Thomas |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Ninja hacking |b unconventional penetration testing tactics and techniques |c Thomas Wilhelm, Jason Andress |
264 | 1 | |a Burlington, MA |b Syngress/Elsevier |c 2011 | |
300 | |a 1 Online-Ressource (xii, 310 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computer crimes |x Prevention | |
650 | 0 | |a Hackers | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Pirates informatiques | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer crimes ; Prevention | |
650 | 4 | |a Computer security | |
650 | 4 | |a Hackers | |
700 | 1 | |a Andress, Jason |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781597495882 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781597495882 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781597495899/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-048584290 |
---|---|
_version_ | 1835903165072932864 |
adam_text | |
any_adam_object | |
author | Wilhelm, Thomas |
author2 | Andress, Jason |
author2_role | ctb |
author2_variant | j a ja |
author_facet | Wilhelm, Thomas Andress, Jason |
author_role | aut |
author_sort | Wilhelm, Thomas |
author_variant | t w tw |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)048584290 (DE-599)KEP048584290 (ORHE)9781597495899 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02500cam a22005532c 4500</leader><controlfield tag="001">ZDB-30-ORH-048584290</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228114656.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191206s2011 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597495899</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-589-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597495891</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-589-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048584290</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP048584290</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597495899</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)048584290</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Wilhelm, Thomas</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ninja hacking</subfield><subfield code="b">unconventional penetration testing tactics and techniques</subfield><subfield code="c">Thomas Wilhelm, Jason Andress</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Burlington, MA</subfield><subfield code="b">Syngress/Elsevier</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 310 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Pirates informatiques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes ; Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hackers</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Andress, Jason</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597495882</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597495882</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597495899/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-048584290 |
illustrated | Illustrated |
indexdate | 2025-06-25T12:14:55Z |
institution | BVB |
isbn | 9781597495899 1597495891 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xii, 310 pages) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Syngress/Elsevier |
record_format | marc |
spelling | Wilhelm, Thomas VerfasserIn aut Ninja hacking unconventional penetration testing tactics and techniques Thomas Wilhelm, Jason Andress Burlington, MA Syngress/Elsevier 2011 1 Online-Ressource (xii, 310 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja. Computer security Computer crimes Prevention Hackers Sécurité informatique Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer crimes ; Prevention Andress, Jason MitwirkendeR ctb 9781597495882 Erscheint auch als Druck-Ausgabe 9781597495882 |
spellingShingle | Wilhelm, Thomas Ninja hacking unconventional penetration testing tactics and techniques Computer security Computer crimes Prevention Hackers Sécurité informatique Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer crimes ; Prevention |
title | Ninja hacking unconventional penetration testing tactics and techniques |
title_auth | Ninja hacking unconventional penetration testing tactics and techniques |
title_exact_search | Ninja hacking unconventional penetration testing tactics and techniques |
title_full | Ninja hacking unconventional penetration testing tactics and techniques Thomas Wilhelm, Jason Andress |
title_fullStr | Ninja hacking unconventional penetration testing tactics and techniques Thomas Wilhelm, Jason Andress |
title_full_unstemmed | Ninja hacking unconventional penetration testing tactics and techniques Thomas Wilhelm, Jason Andress |
title_short | Ninja hacking |
title_sort | ninja hacking unconventional penetration testing tactics and techniques |
title_sub | unconventional penetration testing tactics and techniques |
topic | Computer security Computer crimes Prevention Hackers Sécurité informatique Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer crimes ; Prevention |
topic_facet | Computer security Computer crimes Prevention Hackers Sécurité informatique Pirates informatiques COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Computer crimes ; Prevention |
work_keys_str_mv | AT wilhelmthomas ninjahackingunconventionalpenetrationtestingtacticsandtechniques AT andressjason ninjahackingunconventionalpenetrationtestingtacticsandtechniques |