InfoSec career hacking :: sell your skillz, not your soul /
Do you spend hours coding on an application for the sheer joy and challenge? How about taking the time to analyze every piece of traffic that crosses your network, dissecting packets, and making sure nothing hidden is going on? If you want to refine these skills (and learn many new ones) to build an...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | , , , |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Rockland, MA :
Syngress Pub.,
©2005.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Do you spend hours coding on an application for the sheer joy and challenge? How about taking the time to analyze every piece of traffic that crosses your network, dissecting packets, and making sure nothing hidden is going on? If you want to refine these skills (and learn many new ones) to build an InfoSec career in a top corporation or government agency but aren't sure where to begin, this book is for you! The authors of this book have all succeeded in applying their inherent, hacker skills to build successful InfoSec careers. From them, you will learn about the many, different jobs availabl. |
Beschreibung: | 1 online resource (xxix, 441 pages) : illustrations |
ISBN: | 9781597490436 1597490431 9780080489032 0080489036 1281020281 9781281020284 9786611020286 6611020284 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocm85035895 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 040428s2005 maua o 000 0 eng d | ||
040 | |a CaPaEBR |b eng |e pn |c ZYU |d OCLCQ |d EBLCP |d YDXCP |d UBY |d N$T |d IDEBK |d OCLCQ |d DKDLA |d MERUC |d CCO |d E7B |d OCLCQ |d MHW |d OCLCQ |d OCLCO |d OCLCQ |d OPELS |d OKU |d FVL |d UMI |d DEBSZ |d OCLCA |d OCLCQ |d OCLCF |d OCLCQ |d COO |d OCLCQ |d AZK |d AGLDB |d MOR |d PIFBR |d ZCU |d OCLCQ |d U3W |d OCLCA |d STF |d BRL |d WRM |d D6H |d VTS |d CEF |d NRAMU |d EZ9 |d ICG |d NLE |d INT |d VT2 |d OCLCQ |d A6Q |d OCLCQ |d UAB |d LEAUB |d DKC |d OCLCQ |d M8D |d OL$ |d OCLCQ |d K6U |d VLY |d UKCRE |d UIU |d OCLCO |d OCLCQ |d COA |d OCLCO |d OCLCL |d SXB |d OCLCQ |d OCLCO | ||
019 | |a 123156628 |a 162597236 |a 181421107 |a 474885686 |a 475315949 |a 559916638 |a 646731399 |a 663881326 |a 722353883 |a 728026876 |a 824876114 |a 888567084 |a 961561026 |a 962591523 |a 988451885 |a 991965366 |a 1035655623 |a 1037504435 |a 1037705742 |a 1038659426 |a 1045494301 |a 1047527246 |a 1055379991 |a 1076285746 |a 1081212557 |a 1103250668 |a 1129362773 |a 1153038751 |a 1162025866 |a 1192339643 |a 1228583515 |a 1340051959 | ||
020 | |a 9781597490436 |q (electronic bk. ; |q Adobe Reader) | ||
020 | |a 1597490431 |q (electronic bk. ; |q Adobe Reader) | ||
020 | |a 9780080489032 | ||
020 | |a 0080489036 | ||
020 | |a 1281020281 | ||
020 | |a 9781281020284 | ||
020 | |a 9786611020286 | ||
020 | |a 6611020284 | ||
020 | |z 9781597490115 | ||
020 | |z 1597490113 | ||
024 | 8 | |a (WaSeSS)ssj0000280776 | |
035 | |a (OCoLC)85035895 |z (OCoLC)123156628 |z (OCoLC)162597236 |z (OCoLC)181421107 |z (OCoLC)474885686 |z (OCoLC)475315949 |z (OCoLC)559916638 |z (OCoLC)646731399 |z (OCoLC)663881326 |z (OCoLC)722353883 |z (OCoLC)728026876 |z (OCoLC)824876114 |z (OCoLC)888567084 |z (OCoLC)961561026 |z (OCoLC)962591523 |z (OCoLC)988451885 |z (OCoLC)991965366 |z (OCoLC)1035655623 |z (OCoLC)1037504435 |z (OCoLC)1037705742 |z (OCoLC)1038659426 |z (OCoLC)1045494301 |z (OCoLC)1047527246 |z (OCoLC)1055379991 |z (OCoLC)1076285746 |z (OCoLC)1081212557 |z (OCoLC)1103250668 |z (OCoLC)1129362773 |z (OCoLC)1153038751 |z (OCoLC)1162025866 |z (OCoLC)1192339643 |z (OCoLC)1228583515 |z (OCoLC)1340051959 | ||
050 | 4 | |a QA76.9.A25 |b B39 2005eb | |
082 | 7 | |a 004.023 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Bayles, Aaron W. |1 https://id.oclc.org/worldcat/entity/E39PCjygXY4yC9K6qdkhKhyyBP |0 http://id.loc.gov/authorities/names/no2006060492 | |
245 | 1 | 0 | |a InfoSec career hacking : |b sell your skillz, not your soul / |c Aaron W. Bayles et al ; forward by Christopher W. Klaus. |
260 | |a Rockland, MA : |b Syngress Pub., |c ©2005. | ||
300 | |a 1 online resource (xxix, 441 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
505 | 0 | |a The targets : what I want to be when I grow up (or at least get older) -- Reconnaissance : social engineering for profit -- Enumerate : determine what's out there -- First Strike : basic tactics for successful exploitation -- The laws of security -- No place like /home : creating an attack lab -- Vulnerability disclosure -- Classes of attack -- Don't trip the sensors : integrate and imitate -- Vulnerability remediation : work within the system -- Incident response : putting out fires without getting burned -- Rooting : show me the money! | |
520 | |a Do you spend hours coding on an application for the sheer joy and challenge? How about taking the time to analyze every piece of traffic that crosses your network, dissecting packets, and making sure nothing hidden is going on? If you want to refine these skills (and learn many new ones) to build an InfoSec career in a top corporation or government agency but aren't sure where to begin, this book is for you! The authors of this book have all succeeded in applying their inherent, hacker skills to build successful InfoSec careers. From them, you will learn about the many, different jobs availabl. | ||
588 | 0 | |a Print version record. | |
546 | |a English. | ||
650 | 0 | |a Hackers. |0 http://id.loc.gov/authorities/subjects/sh94005931 | |
650 | 0 | |a Computer security. | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Pirates informatiques. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Hackers |2 fast | |
700 | 1 | |a Brindley, Ed. | |
700 | 1 | |a Foster, James C. | |
700 | 1 | |a Hurley, Chris. | |
700 | 1 | |a Long, Johnny. | |
758 | |i has work: |a InfoSec career hacking (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGCW7xccmwhWW7K9Kp74dP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Bayles, Aaron W. |t InfoSec career hacking. |d Rockland, MA : Syngress Pub., ©2005 |z 9781597490115 |w (OCoLC)60677351 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249315 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597490115 |3 Volltext |
936 | |a BATCHLOAD | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL227231 | ||
938 | |a ebrary |b EBRY |n ebr10078533 | ||
938 | |a EBSCOhost |b EBSC |n 249315 | ||
938 | |a Internet Archive |b INAR |n infoseccareerhac0000bayl | ||
938 | |a YBP Library Services |b YANK |n 2627185 | ||
938 | |a YBP Library Services |b YANK |n 2730620 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocm85035895 |
---|---|
_version_ | 1816881645466157056 |
adam_text | |
any_adam_object | |
author | Bayles, Aaron W. |
author2 | Brindley, Ed Foster, James C. Hurley, Chris Long, Johnny |
author2_role | |
author2_variant | e b eb j c f jc jcf c h ch j l jl |
author_GND | http://id.loc.gov/authorities/names/no2006060492 |
author_facet | Bayles, Aaron W. Brindley, Ed Foster, James C. Hurley, Chris Long, Johnny |
author_role | |
author_sort | Bayles, Aaron W. |
author_variant | a w b aw awb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 B39 2005eb |
callnumber-search | QA76.9.A25 B39 2005eb |
callnumber-sort | QA 276.9 A25 B39 42005EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | The targets : what I want to be when I grow up (or at least get older) -- Reconnaissance : social engineering for profit -- Enumerate : determine what's out there -- First Strike : basic tactics for successful exploitation -- The laws of security -- No place like /home : creating an attack lab -- Vulnerability disclosure -- Classes of attack -- Don't trip the sensors : integrate and imitate -- Vulnerability remediation : work within the system -- Incident response : putting out fires without getting burned -- Rooting : show me the money! |
ctrlnum | (OCoLC)85035895 |
dewey-full | 004.023 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 004 - Computer science |
dewey-raw | 004.023 |
dewey-search | 004.023 |
dewey-sort | 14.023 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05245cam a2200721 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocm85035895 </controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">040428s2005 maua o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaPaEBR</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">ZYU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">YDXCP</subfield><subfield code="d">UBY</subfield><subfield code="d">N$T</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKDLA</subfield><subfield code="d">MERUC</subfield><subfield code="d">CCO</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MHW</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OPELS</subfield><subfield code="d">OKU</subfield><subfield code="d">FVL</subfield><subfield code="d">UMI</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">STF</subfield><subfield code="d">BRL</subfield><subfield code="d">WRM</subfield><subfield code="d">D6H</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">NRAMU</subfield><subfield code="d">EZ9</subfield><subfield code="d">ICG</subfield><subfield code="d">NLE</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UAB</subfield><subfield code="d">LEAUB</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">M8D</subfield><subfield code="d">OL$</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">VLY</subfield><subfield code="d">UKCRE</subfield><subfield code="d">UIU</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">COA</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">123156628</subfield><subfield code="a">162597236</subfield><subfield code="a">181421107</subfield><subfield code="a">474885686</subfield><subfield code="a">475315949</subfield><subfield code="a">559916638</subfield><subfield code="a">646731399</subfield><subfield code="a">663881326</subfield><subfield code="a">722353883</subfield><subfield code="a">728026876</subfield><subfield code="a">824876114</subfield><subfield code="a">888567084</subfield><subfield code="a">961561026</subfield><subfield code="a">962591523</subfield><subfield code="a">988451885</subfield><subfield code="a">991965366</subfield><subfield code="a">1035655623</subfield><subfield code="a">1037504435</subfield><subfield code="a">1037705742</subfield><subfield code="a">1038659426</subfield><subfield code="a">1045494301</subfield><subfield code="a">1047527246</subfield><subfield code="a">1055379991</subfield><subfield code="a">1076285746</subfield><subfield code="a">1081212557</subfield><subfield code="a">1103250668</subfield><subfield code="a">1129362773</subfield><subfield code="a">1153038751</subfield><subfield code="a">1162025866</subfield><subfield code="a">1192339643</subfield><subfield code="a">1228583515</subfield><subfield code="a">1340051959</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490436</subfield><subfield code="q">(electronic bk. ;</subfield><subfield code="q">Adobe Reader)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490431</subfield><subfield code="q">(electronic bk. ;</subfield><subfield code="q">Adobe Reader)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080489032</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0080489036</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281020281</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281020284</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611020286</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611020284</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781597490115</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1597490113</subfield></datafield><datafield tag="024" ind1="8" ind2=" "><subfield code="a">(WaSeSS)ssj0000280776</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)85035895</subfield><subfield code="z">(OCoLC)123156628</subfield><subfield code="z">(OCoLC)162597236</subfield><subfield code="z">(OCoLC)181421107</subfield><subfield code="z">(OCoLC)474885686</subfield><subfield code="z">(OCoLC)475315949</subfield><subfield code="z">(OCoLC)559916638</subfield><subfield code="z">(OCoLC)646731399</subfield><subfield code="z">(OCoLC)663881326</subfield><subfield code="z">(OCoLC)722353883</subfield><subfield code="z">(OCoLC)728026876</subfield><subfield code="z">(OCoLC)824876114</subfield><subfield code="z">(OCoLC)888567084</subfield><subfield code="z">(OCoLC)961561026</subfield><subfield code="z">(OCoLC)962591523</subfield><subfield code="z">(OCoLC)988451885</subfield><subfield code="z">(OCoLC)991965366</subfield><subfield code="z">(OCoLC)1035655623</subfield><subfield code="z">(OCoLC)1037504435</subfield><subfield code="z">(OCoLC)1037705742</subfield><subfield code="z">(OCoLC)1038659426</subfield><subfield code="z">(OCoLC)1045494301</subfield><subfield code="z">(OCoLC)1047527246</subfield><subfield code="z">(OCoLC)1055379991</subfield><subfield code="z">(OCoLC)1076285746</subfield><subfield code="z">(OCoLC)1081212557</subfield><subfield code="z">(OCoLC)1103250668</subfield><subfield code="z">(OCoLC)1129362773</subfield><subfield code="z">(OCoLC)1153038751</subfield><subfield code="z">(OCoLC)1162025866</subfield><subfield code="z">(OCoLC)1192339643</subfield><subfield code="z">(OCoLC)1228583515</subfield><subfield code="z">(OCoLC)1340051959</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">B39 2005eb</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">004.023</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Bayles, Aaron W.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjygXY4yC9K6qdkhKhyyBP</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2006060492</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">InfoSec career hacking :</subfield><subfield code="b">sell your skillz, not your soul /</subfield><subfield code="c">Aaron W. Bayles et al ; forward by Christopher W. Klaus.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Rockland, MA :</subfield><subfield code="b">Syngress Pub.,</subfield><subfield code="c">©2005.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxix, 441 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">The targets : what I want to be when I grow up (or at least get older) -- Reconnaissance : social engineering for profit -- Enumerate : determine what's out there -- First Strike : basic tactics for successful exploitation -- The laws of security -- No place like /home : creating an attack lab -- Vulnerability disclosure -- Classes of attack -- Don't trip the sensors : integrate and imitate -- Vulnerability remediation : work within the system -- Incident response : putting out fires without getting burned -- Rooting : show me the money!</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Do you spend hours coding on an application for the sheer joy and challenge? How about taking the time to analyze every piece of traffic that crosses your network, dissecting packets, and making sure nothing hidden is going on? If you want to refine these skills (and learn many new ones) to build an InfoSec career in a top corporation or government agency but aren't sure where to begin, this book is for you! The authors of this book have all succeeded in applying their inherent, hacker skills to build successful InfoSec careers. From them, you will learn about the many, different jobs availabl.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hackers.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94005931</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Pirates informatiques.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Hackers</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Brindley, Ed.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Foster, James C.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hurley, Chris.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Long, Johnny.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">InfoSec career hacking (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGCW7xccmwhWW7K9Kp74dP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Bayles, Aaron W.</subfield><subfield code="t">InfoSec career hacking.</subfield><subfield code="d">Rockland, MA : Syngress Pub., ©2005</subfield><subfield code="z">9781597490115</subfield><subfield code="w">(OCoLC)60677351</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249315</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597490115</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL227231</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10078533</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">249315</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Internet Archive</subfield><subfield code="b">INAR</subfield><subfield code="n">infoseccareerhac0000bayl</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2627185</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2730620</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocm85035895 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:01Z |
institution | BVB |
isbn | 9781597490436 1597490431 9780080489032 0080489036 1281020281 9781281020284 9786611020286 6611020284 |
language | English |
oclc_num | 85035895 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxix, 441 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Syngress Pub., |
record_format | marc |
spelling | Bayles, Aaron W. https://id.oclc.org/worldcat/entity/E39PCjygXY4yC9K6qdkhKhyyBP http://id.loc.gov/authorities/names/no2006060492 InfoSec career hacking : sell your skillz, not your soul / Aaron W. Bayles et al ; forward by Christopher W. Klaus. Rockland, MA : Syngress Pub., ©2005. 1 online resource (xxix, 441 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier data file The targets : what I want to be when I grow up (or at least get older) -- Reconnaissance : social engineering for profit -- Enumerate : determine what's out there -- First Strike : basic tactics for successful exploitation -- The laws of security -- No place like /home : creating an attack lab -- Vulnerability disclosure -- Classes of attack -- Don't trip the sensors : integrate and imitate -- Vulnerability remediation : work within the system -- Incident response : putting out fires without getting burned -- Rooting : show me the money! Do you spend hours coding on an application for the sheer joy and challenge? How about taking the time to analyze every piece of traffic that crosses your network, dissecting packets, and making sure nothing hidden is going on? If you want to refine these skills (and learn many new ones) to build an InfoSec career in a top corporation or government agency but aren't sure where to begin, this book is for you! The authors of this book have all succeeded in applying their inherent, hacker skills to build successful InfoSec careers. From them, you will learn about the many, different jobs availabl. Print version record. English. Hackers. http://id.loc.gov/authorities/subjects/sh94005931 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Pirates informatiques. Sécurité informatique. Computer security fast Hackers fast Brindley, Ed. Foster, James C. Hurley, Chris. Long, Johnny. has work: InfoSec career hacking (Text) https://id.oclc.org/worldcat/entity/E39PCGCW7xccmwhWW7K9Kp74dP https://id.oclc.org/worldcat/ontology/hasWork Print version: Bayles, Aaron W. InfoSec career hacking. Rockland, MA : Syngress Pub., ©2005 9781597490115 (OCoLC)60677351 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249315 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597490115 Volltext |
spellingShingle | Bayles, Aaron W. InfoSec career hacking : sell your skillz, not your soul / The targets : what I want to be when I grow up (or at least get older) -- Reconnaissance : social engineering for profit -- Enumerate : determine what's out there -- First Strike : basic tactics for successful exploitation -- The laws of security -- No place like /home : creating an attack lab -- Vulnerability disclosure -- Classes of attack -- Don't trip the sensors : integrate and imitate -- Vulnerability remediation : work within the system -- Incident response : putting out fires without getting burned -- Rooting : show me the money! Hackers. http://id.loc.gov/authorities/subjects/sh94005931 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Pirates informatiques. Sécurité informatique. Computer security fast Hackers fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh94005931 https://id.nlm.nih.gov/mesh/D016494 |
title | InfoSec career hacking : sell your skillz, not your soul / |
title_auth | InfoSec career hacking : sell your skillz, not your soul / |
title_exact_search | InfoSec career hacking : sell your skillz, not your soul / |
title_full | InfoSec career hacking : sell your skillz, not your soul / Aaron W. Bayles et al ; forward by Christopher W. Klaus. |
title_fullStr | InfoSec career hacking : sell your skillz, not your soul / Aaron W. Bayles et al ; forward by Christopher W. Klaus. |
title_full_unstemmed | InfoSec career hacking : sell your skillz, not your soul / Aaron W. Bayles et al ; forward by Christopher W. Klaus. |
title_short | InfoSec career hacking : |
title_sort | infosec career hacking sell your skillz not your soul |
title_sub | sell your skillz, not your soul / |
topic | Hackers. http://id.loc.gov/authorities/subjects/sh94005931 Computer security. Computer Security https://id.nlm.nih.gov/mesh/D016494 Pirates informatiques. Sécurité informatique. Computer security fast Hackers fast |
topic_facet | Hackers. Computer security. Computer Security Pirates informatiques. Sécurité informatique. Computer security Hackers |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=249315 https://www.sciencedirect.com/science/book/9781597490115 |
work_keys_str_mv | AT baylesaaronw infoseccareerhackingsellyourskillznotyoursoul AT brindleyed infoseccareerhackingsellyourskillznotyoursoul AT fosterjamesc infoseccareerhackingsellyourskillznotyoursoul AT hurleychris infoseccareerhackingsellyourskillznotyoursoul AT longjohnny infoseccareerhackingsellyourskillznotyoursoul |