The art of attack: attacker mindset for security professionals (Record no. 1808)

MARC details
000 -LEADER
fixed length control field 02208nam a2200217 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250804160132.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250804b2021|||||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781119806288
041 ## - LANGUAGE CODE
Language code of text/sound track or separate title English
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
100 ## - MAIN ENTRY--AUTHOR NAME
Personal name Reynolds, Maxie
Relator term Author
245 ## - TITLE STATEMENT
Title The art of attack: attacker mindset for security professionals
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication New Jersey:
Name of publisher Wiley Data and Cybersecurity,
Year of publication 2021.
300 ## - PHYSICAL DESCRIPTION
Number of Pages xix, 284p.
500 ## - GENERAL NOTE
General note Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers<br/><br/>In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to use it to their advantage. Adopting this mindset will result in the improvement of security, offensively and defensively, by allowing you to see your environment objectively through the eyes of an attacker.<br/><br/>The book shows you the laws of the mindset and the techniques attackers use, from persistence to "start with the end" strategies and non-linear thinking, that make them so dangerous. You'll discover:<br/><br/>A variety of attacker strategies, including approaches, processes, reconnaissance, privilege escalation, redundant access, and escape techniques<br/>The unique tells and signs of an attack and how to avoid becoming a victim of one<br/>What the science of psychology tells us about amygdala hijacking and other tendencies that you need to protect against<br/>Perfect for red teams, social engineers, pentesters, and ethical hackers seeking to fortify and harden their systems and the systems of their clients, The Art of Attack is an invaluable resource for anyone in the technology security space seeking a one-stop resource that puts them in the mind of an attacker.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term The Attacker Mindset Framework
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Staying Protected—The Individual
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical Term Staying Protected—The Business
856 ## - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://ieeexplore.ieee.org/servlet/opac?bknumber=9946655
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type e-Books
Holdings
Withdrawn status Lost status Damaged status Not for loan Permanent Location Current Location Shelving location Coded location qualifier Full call number Accession Number Koha item type
        Dr. S. R. Ranganathan Library Dr. S. R. Ranganathan Library Ebook (Online Access) --- 005.8 EB0232 e-Books

Implemented and Maintained by Dr. S.R. Ranganathan Library.
For any Suggestions/Query Contact to library or Email: library@iipe.ac.in
Website/OPAC best viewed in Mozilla Browser in 1366X768 Resolution.

Powered by Koha