Peter Kim

Peter Kim’s Followers (33)

member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo
member photo

Peter Kim



Average rating: 4.08 · 1,344 ratings · 61 reviews · 51 distinct worksSimilar authors
The Hacker Playbook: Practi...

3.96 avg rating — 470 ratings — published 2014 — 4 editions
Rate this book
Clear rating
The Hacker Playbook 2: Prac...

4.24 avg rating — 436 ratings — published 2015 — 4 editions
Rate this book
Clear rating
The Hacker Playbook 3: Prac...

4.40 avg rating — 252 ratings4 editions
Rate this book
Clear rating
RC Electric Cars (How-To Ma...

3.80 avg rating — 5 ratings — published 2013
Rate this book
Clear rating
Finding Your Funding Model:...

by
3.60 avg rating — 5 ratings — published 2011 — 2 editions
Rate this book
Clear rating
ETF Wealth: How to Make a F...

really liked it 4.00 avg rating — 4 ratings — published 2012
Rate this book
Clear rating
The Double

really liked it 4.00 avg rating — 4 ratings2 editions
Rate this book
Clear rating
How to Grow Asparagus! (How...

3.67 avg rating — 3 ratings — published 2013
Rate this book
Clear rating
How to Prepare Soil for a G...

3.33 avg rating — 3 ratings — published 2013
Rate this book
Clear rating
Cybersecurity Illustrated: ...

3.33 avg rating — 3 ratings2 editions
Rate this book
Clear rating
More books by Peter Kim…
Quotes by Peter Kim  (?)
Quotes are added by the Goodreads community and are not verified by Goodreads. (Learn more)

“Take a full clean snapshot of your working VMs and let’s start discovering and attacking networks. Before you run any plays, you have to know and analyze your opponent. Studying the target for weaknesses and understanding the environment will provide huge payoffs. This chapter will take a look at scanning from a slightly different aspect than the normal penetration testing books and should be seen as an additive to your current scanning processes, not as a replacement.”
Peter Kim, The Hacker Playbook: Practical Guide to Penetration Testing



Is this you? Let us know. If not, help out and invite Peter to Goodreads.