<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>The Hacker Playbook 3</title>
    <subTitle>Practical Guide To Penetration Testing</subTitle>
  </titleInfo>
  <name type="personal">
    <namePart>Kim, Peter</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <typeOfResource>text</typeOfResource>
  <originInfo>
    <place>
      <placeTerm type="text">USA</placeTerm>
    </place>
    <publisher>Secure Planet</publisher>
    <dateIssued>2018</dateIssued>
    <edition>Red Team Edition </edition>
    <issuance>monographic</issuance>
  </originInfo>
  <language>
    <languageTerm authority="iso639-2b" type="code">eng</languageTerm>
  </language>
  <physicalDescription>
    <form authority="marcform">print</form>
    <extent>ix, 271: pages </extent>
  </physicalDescription>
  <tableOfContents>Pregame - The Setup (Page-1), Before the Snap - Red Team Recon (Page-23), The throw - Web Application Exploitation (Page-44), The Drive-Compromising the Network (Page-99), The Screen - Social Engineering (Page-173), The Onside Kick -Physical Attacks (Page-191), The Quarterback Sneak - Evading AV and Networks Detection (Page-211), Special Teams - Cracking, Exploits and Tricks (page-240), Two-Minute Drill - From Zero to Hero (Page-256). </tableOfContents>
  <note type="statement of responsibility">by Peter Kim</note>
  <classification authority="ddc">005.1, KIM</classification>
  <identifier type="isbn">9781980901754</identifier>
  <recordInfo>
    <recordCreationDate encoding="marc">220726</recordCreationDate>
    <recordChangeDate encoding="iso8601">20250826111333.0</recordChangeDate>
  </recordInfo>
</mods>
