|
|
|
|
LEADER |
00000nam a22000005i 4500 |
001 |
978-1-4842-1857-0 |
003 |
DE-He213 |
005 |
20220124160011.0 |
007 |
cr nn 008mamaa |
008 |
160714s2016 xxu| s |||| 0|eng d |
020 |
|
|
|a 9781484218570
|9 978-1-4842-1857-0
|
024 |
7 |
|
|a 10.1007/978-1-4842-1857-0
|2 doi
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a UR
|2 bicssc
|
072 |
|
7 |
|a UTN
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a UR
|2 thema
|
072 |
|
7 |
|a UTN
|2 thema
|
082 |
0 |
4 |
|a 005.8
|2 23
|
100 |
1 |
|
|a Messier, Ric.
|e author.
|4 aut
|4 http://id.loc.gov/vocabulary/relators/aut
|
245 |
1 |
0 |
|a Penetration Testing Basics
|h [electronic resource] :
|b A Quick-Start Guide to Breaking into Systems /
|c by Ric Messier.
|
250 |
|
|
|a 1st ed. 2016.
|
264 |
|
1 |
|a Berkeley, CA :
|b Apress :
|b Imprint: Apress,
|c 2016.
|
300 |
|
|
|a XV, 115 p. 41 illus., 34 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
505 |
0 |
|
|a 1. What Is Penetration Testing? -- 2. Digging for Information -- 3. What's Open? -- 4. Vulnerabilities -- 5. Exploitation -- 6. Breaking Web Sites -- 7. Reporting.
|
520 |
|
|
|a Penetration testing is the act of attempting to break into systems, networks, and software in order to determine where the bad guys might get in. By reading this book, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. Penetration Testing Basics explains: How to identify security vulnerabilities How to use some of the top security tools in order to identify holes How to read reports from testing tools Common vulnerability types and attacks Common Web-based attacks and exposures as well as recommendations for closing those holes.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Computer programming.
|
650 |
|
0 |
|a Software engineering.
|
650 |
1 |
4 |
|a Data and Information Security.
|
650 |
2 |
4 |
|a Programming Techniques.
|
650 |
2 |
4 |
|a Software Engineering.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer Nature eBook
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484218563
|
776 |
0 |
8 |
|i Printed edition:
|z 9781484218587
|
856 |
4 |
0 |
|u https://doi.uam.elogim.com/10.1007/978-1-4842-1857-0
|z Texto Completo
|
912 |
|
|
|a ZDB-2-CWD
|
912 |
|
|
|a ZDB-2-SXPC
|
950 |
|
|
|a Professional and Applied Computing (SpringerNature-12059)
|
950 |
|
|
|a Professional and Applied Computing (R0) (SpringerNature-43716)
|