Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boston
Addison-Wesley
[2025]
|
Ausgabe: | [First edition]. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9780138363635/?ar |
Zusammenfassung: | Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts with modern hacking methodologies and the tools to combat evolving threats. Written by industry experts Omar Santos, Savannah Lazzara, and Wesley Thurner, this book blends real-world insights with forward-looking perspectives on AI, automation, and quantum computing. Packed with hands-on exercises, actionable strategies, and case studies, it empowers readers to think like attackers while proactively strengthening their defenses. Gain practical knowledge to master red teaming, bug bounty hunting, and prepare for an AI-influenced cybersecurity landscape. |
Beschreibung: | Includes bibliographical references and index |
Umfang: | 1 Online-Ressource (608 pages) illustrations |
Internformat
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-113666896 | ||
003 | DE-627-1 | ||
005 | 20250402110955.0 | ||
007 | cr uuu---uuuuu | ||
008 | 250402s2025 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)113666896 | ||
035 | |a (DE-599)KEP113666896 | ||
035 | |a (ORHE)9780138363635 | ||
035 | |a (DE-627-1)113666896 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20250311 | |
100 | 1 | |a Santos, Omar |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Redefining hacking |b a comprehensive guide to red teaming and bug bounty hunting in an AI-driven world |c Omar Santos, Savannah Lazzara, Wesley Thurner |
250 | |a [First edition]. | ||
264 | 1 | |a Boston |b Addison-Wesley |c [2025] | |
300 | |a 1 Online-Ressource (608 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index | ||
520 | |a Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts with modern hacking methodologies and the tools to combat evolving threats. Written by industry experts Omar Santos, Savannah Lazzara, and Wesley Thurner, this book blends real-world insights with forward-looking perspectives on AI, automation, and quantum computing. Packed with hands-on exercises, actionable strategies, and case studies, it empowers readers to think like attackers while proactively strengthening their defenses. Gain practical knowledge to master red teaming, bug bounty hunting, and prepare for an AI-influenced cybersecurity landscape. | ||
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Artificial intelligence | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 0 | |a Hacking | |
650 | 0 | |a Computer security | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Intelligence artificielle | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Piratage informatique | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a artificial intelligence | |
700 | 1 | |a Lazzara, Savannah |e VerfasserIn |4 aut | |
700 | 1 | |a Thurner, Wesley |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9780138363635/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-113666896 |
---|---|
_version_ | 1835903238380978176 |
adam_text | |
any_adam_object | |
author | Santos, Omar Lazzara, Savannah Thurner, Wesley |
author_facet | Santos, Omar Lazzara, Savannah Thurner, Wesley |
author_role | aut aut aut |
author_sort | Santos, Omar |
author_variant | o s os s l sl w t wt |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)113666896 (DE-599)KEP113666896 (ORHE)9780138363635 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | [First edition]. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02445nam a22004812c 4500</leader><controlfield tag="001">ZDB-30-ORH-113666896</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20250402110955.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">250402s2025 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)113666896</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP113666896</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9780138363635</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)113666896</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20250311</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Santos, Omar</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Redefining hacking</subfield><subfield code="b">a comprehensive guide to red teaming and bug bounty hunting in an AI-driven world</subfield><subfield code="c">Omar Santos, Savannah Lazzara, Wesley Thurner</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">[First edition].</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boston</subfield><subfield code="b">Addison-Wesley</subfield><subfield code="c">[2025]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (608 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts with modern hacking methodologies and the tools to combat evolving threats. Written by industry experts Omar Santos, Savannah Lazzara, and Wesley Thurner, this book blends real-world insights with forward-looking perspectives on AI, automation, and quantum computing. Packed with hands-on exercises, actionable strategies, and case studies, it empowers readers to think like attackers while proactively strengthening their defenses. Gain practical knowledge to master red teaming, bug bounty hunting, and prepare for an AI-influenced cybersecurity landscape.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Intelligence artificielle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">artificial intelligence</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lazzara, Savannah</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Thurner, Wesley</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9780138363635/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-113666896 |
illustrated | Illustrated |
indexdate | 2025-06-25T12:16:05Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (608 pages) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2025 |
publishDateSearch | 2025 |
publishDateSort | 2025 |
publisher | Addison-Wesley |
record_format | marc |
spelling | Santos, Omar VerfasserIn aut Redefining hacking a comprehensive guide to red teaming and bug bounty hunting in an AI-driven world Omar Santos, Savannah Lazzara, Wesley Thurner [First edition]. Boston Addison-Wesley [2025] 1 Online-Ressource (608 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index Redefining Hacking: A Comprehensive Guide to Red Teaming and Bug Bounty Hunting in an AI-Driven World equips cybersecurity professionals, students, and tech enthusiasts with modern hacking methodologies and the tools to combat evolving threats. Written by industry experts Omar Santos, Savannah Lazzara, and Wesley Thurner, this book blends real-world insights with forward-looking perspectives on AI, automation, and quantum computing. Packed with hands-on exercises, actionable strategies, and case studies, it empowers readers to think like attackers while proactively strengthening their defenses. Gain practical knowledge to master red teaming, bug bounty hunting, and prepare for an AI-influenced cybersecurity landscape. Penetration testing (Computer security) Artificial intelligence Computer networks Security measures Hacking Computer security Tests d'intrusion Intelligence artificielle Réseaux d'ordinateurs ; Sécurité ; Mesures Piratage informatique Sécurité informatique artificial intelligence Lazzara, Savannah VerfasserIn aut Thurner, Wesley VerfasserIn aut |
spellingShingle | Santos, Omar Lazzara, Savannah Thurner, Wesley Redefining hacking a comprehensive guide to red teaming and bug bounty hunting in an AI-driven world Penetration testing (Computer security) Artificial intelligence Computer networks Security measures Hacking Computer security Tests d'intrusion Intelligence artificielle Réseaux d'ordinateurs ; Sécurité ; Mesures Piratage informatique Sécurité informatique artificial intelligence |
title | Redefining hacking a comprehensive guide to red teaming and bug bounty hunting in an AI-driven world |
title_auth | Redefining hacking a comprehensive guide to red teaming and bug bounty hunting in an AI-driven world |
title_exact_search | Redefining hacking a comprehensive guide to red teaming and bug bounty hunting in an AI-driven world |
title_full | Redefining hacking a comprehensive guide to red teaming and bug bounty hunting in an AI-driven world Omar Santos, Savannah Lazzara, Wesley Thurner |
title_fullStr | Redefining hacking a comprehensive guide to red teaming and bug bounty hunting in an AI-driven world Omar Santos, Savannah Lazzara, Wesley Thurner |
title_full_unstemmed | Redefining hacking a comprehensive guide to red teaming and bug bounty hunting in an AI-driven world Omar Santos, Savannah Lazzara, Wesley Thurner |
title_short | Redefining hacking |
title_sort | redefining hacking a comprehensive guide to red teaming and bug bounty hunting in an ai driven world |
title_sub | a comprehensive guide to red teaming and bug bounty hunting in an AI-driven world |
topic | Penetration testing (Computer security) Artificial intelligence Computer networks Security measures Hacking Computer security Tests d'intrusion Intelligence artificielle Réseaux d'ordinateurs ; Sécurité ; Mesures Piratage informatique Sécurité informatique artificial intelligence |
topic_facet | Penetration testing (Computer security) Artificial intelligence Computer networks Security measures Hacking Computer security Tests d'intrusion Intelligence artificielle Réseaux d'ordinateurs ; Sécurité ; Mesures Piratage informatique Sécurité informatique artificial intelligence |
work_keys_str_mv | AT santosomar redefininghackingacomprehensiveguidetoredteamingandbugbountyhuntinginanaidrivenworld AT lazzarasavannah redefininghackingacomprehensiveguidetoredteamingandbugbountyhuntinginanaidrivenworld AT thurnerwesley redefininghackingacomprehensiveguidetoredteamingandbugbountyhuntinginanaidrivenworld |