Tribe of hackers red team: tribal knowledge from the best in offensive cybersecurity
Want Red Team offensive advice from the biggest cybersecurity names in the industry' Join our tribe. The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities...
Saved in:
Main Authors: | , |
---|---|
Format: | Electronic eBook |
Language: | English |
Published: |
Newark
John Wiley & Sons, Incorporated
2019
|
Subjects: | |
Links: | https://learning.oreilly.com/library/view/-/9781119643326/?ar |
Summary: | Want Red Team offensive advice from the biggest cybersecurity names in the industry' Join our tribe. The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more -Learn what it takes to secure a Red Team job and to stand out from other candidates -Discover how to hone your hacking skills while staying on the right side of the law -Get tips for collaborating on documentation and reporting -Explore ways to garner support from leadership on your security proposals -Identify the most important control to prevent compromising your network -Uncover the latest tools for Red Team offensive security Whether you're new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive. |
Item Description: | Online resource, title from digital title page (viewed on June 23, 2020) |
Physical Description: | 1 online resource (xi, 275 pages) illustrations, portraits |
ISBN: | 9781119643357 111964335X 1119643368 9781119643364 9781119643333 1119643333 9781119643326 |
Staff View
MARC
LEADER | 00000cam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-049358545 | ||
003 | DE-627-1 | ||
005 | 20240228120837.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200120s2019 xx |||||o 00| ||eng c | ||
020 | |a 9781119643357 |c electronic bk. ; |9 978-1-119-64335-7 | ||
020 | |a 111964335X |c electronic bk. ; |9 1-119-64335-X | ||
020 | |a 1119643368 |9 1-119-64336-8 | ||
020 | |a 9781119643364 |c electronic bk. |9 978-1-119-64336-4 | ||
020 | |a 9781119643333 |c electronic bk. |9 978-1-119-64333-3 | ||
020 | |a 1119643333 |c electronic bk. |9 1-119-64333-3 | ||
020 | |a 9781119643326 |9 978-1-119-64332-6 | ||
035 | |a (DE-627-1)049358545 | ||
035 | |a (DE-599)KEP049358545 | ||
035 | |a (ORHE)9781119643326 | ||
035 | |a (DE-627-1)049358545 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Carey, Marcus J. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Tribe of hackers red team |b tribal knowledge from the best in offensive cybersecurity |c Marcus J. Carey and Jennifer Jin |
264 | 1 | |a Newark |b John Wiley & Sons, Incorporated |c 2019 | |
300 | |a 1 online resource (xi, 275 pages) |b illustrations, portraits | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Online resource, title from digital title page (viewed on June 23, 2020) | ||
520 | |a Want Red Team offensive advice from the biggest cybersecurity names in the industry' Join our tribe. The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more -Learn what it takes to secure a Red Team job and to stand out from other candidates -Discover how to hone your hacking skills while staying on the right side of the law -Get tips for collaborating on documentation and reporting -Explore ways to garner support from leadership on your security proposals -Identify the most important control to prevent compromising your network -Uncover the latest tools for Red Team offensive security Whether you're new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive. | ||
650 | 0 | |a Computer security | |
650 | 0 | |a Computers | |
650 | 0 | |a Electronic digital computers | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Ordinateurs | |
650 | 4 | |a computers | |
650 | 4 | |a COMPUTERS ; Security ; Cryptography | |
650 | 4 | |a Electronic digital computers | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers | |
700 | 1 | |a Jin, Jennifer |e VerfasserIn |4 aut | |
776 | 1 | |z 9781119643326 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781119643326 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781119643326/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Record in the Search Index
DE-BY-TUM_katkey | ZDB-30-ORH-049358545 |
---|---|
_version_ | 1833357052768944128 |
adam_text | |
any_adam_object | |
author | Carey, Marcus J. Jin, Jennifer |
author_facet | Carey, Marcus J. Jin, Jennifer |
author_role | aut aut |
author_sort | Carey, Marcus J. |
author_variant | m j c mj mjc j j jj |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)049358545 (DE-599)KEP049358545 (ORHE)9781119643326 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03798cam a22005652c 4500</leader><controlfield tag="001">ZDB-30-ORH-049358545</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120837.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200120s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643357</subfield><subfield code="c">electronic bk. ;</subfield><subfield code="9">978-1-119-64335-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">111964335X</subfield><subfield code="c">electronic bk. ;</subfield><subfield code="9">1-119-64335-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119643368</subfield><subfield code="9">1-119-64336-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643364</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-64336-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643333</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-119-64333-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1119643333</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-119-64333-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781119643326</subfield><subfield code="9">978-1-119-64332-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)049358545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP049358545</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781119643326</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)049358545</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Carey, Marcus J.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Tribe of hackers red team</subfield><subfield code="b">tribal knowledge from the best in offensive cybersecurity</subfield><subfield code="c">Marcus J. Carey and Jennifer Jin</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Newark</subfield><subfield code="b">John Wiley & Sons, Incorporated</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xi, 275 pages)</subfield><subfield code="b">illustrations, portraits</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource, title from digital title page (viewed on June 23, 2020)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Want Red Team offensive advice from the biggest cybersecurity names in the industry' Join our tribe. The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more -Learn what it takes to secure a Red Team job and to stand out from other candidates -Discover how to hone your hacking skills while staying on the right side of the law -Get tips for collaborating on documentation and reporting -Explore ways to garner support from leadership on your security proposals -Identify the most important control to prevent compromising your network -Uncover the latest tools for Red Team offensive security Whether you're new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic digital computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Cryptography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Electronic digital computers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jin, Jennifer</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781119643326</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781119643326</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781119643326/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-049358545 |
illustrated | Illustrated |
indexdate | 2025-05-28T09:45:33Z |
institution | BVB |
isbn | 9781119643357 111964335X 1119643368 9781119643364 9781119643333 1119643333 9781119643326 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (xi, 275 pages) illustrations, portraits |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | John Wiley & Sons, Incorporated |
record_format | marc |
spelling | Carey, Marcus J. VerfasserIn aut Tribe of hackers red team tribal knowledge from the best in offensive cybersecurity Marcus J. Carey and Jennifer Jin Newark John Wiley & Sons, Incorporated 2019 1 online resource (xi, 275 pages) illustrations, portraits Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Online resource, title from digital title page (viewed on June 23, 2020) Want Red Team offensive advice from the biggest cybersecurity names in the industry' Join our tribe. The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more -Learn what it takes to secure a Red Team job and to stand out from other candidates -Discover how to hone your hacking skills while staying on the right side of the law -Get tips for collaborating on documentation and reporting -Explore ways to garner support from leadership on your security proposals -Identify the most important control to prevent compromising your network -Uncover the latest tools for Red Team offensive security Whether you're new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive. Computer security Computers Electronic digital computers Sécurité informatique Ordinateurs computers COMPUTERS ; Security ; Cryptography Jin, Jennifer VerfasserIn aut 9781119643326 Erscheint auch als Druck-Ausgabe 9781119643326 |
spellingShingle | Carey, Marcus J. Jin, Jennifer Tribe of hackers red team tribal knowledge from the best in offensive cybersecurity Computer security Computers Electronic digital computers Sécurité informatique Ordinateurs computers COMPUTERS ; Security ; Cryptography |
title | Tribe of hackers red team tribal knowledge from the best in offensive cybersecurity |
title_auth | Tribe of hackers red team tribal knowledge from the best in offensive cybersecurity |
title_exact_search | Tribe of hackers red team tribal knowledge from the best in offensive cybersecurity |
title_full | Tribe of hackers red team tribal knowledge from the best in offensive cybersecurity Marcus J. Carey and Jennifer Jin |
title_fullStr | Tribe of hackers red team tribal knowledge from the best in offensive cybersecurity Marcus J. Carey and Jennifer Jin |
title_full_unstemmed | Tribe of hackers red team tribal knowledge from the best in offensive cybersecurity Marcus J. Carey and Jennifer Jin |
title_short | Tribe of hackers red team |
title_sort | tribe of hackers red team tribal knowledge from the best in offensive cybersecurity |
title_sub | tribal knowledge from the best in offensive cybersecurity |
topic | Computer security Computers Electronic digital computers Sécurité informatique Ordinateurs computers COMPUTERS ; Security ; Cryptography |
topic_facet | Computer security Computers Electronic digital computers Sécurité informatique Ordinateurs computers COMPUTERS ; Security ; Cryptography |
work_keys_str_mv | AT careymarcusj tribeofhackersredteamtribalknowledgefromthebestinoffensivecybersecurity AT jinjennifer tribeofhackersredteamtribalknowledgefromthebestinoffensivecybersecurity |