|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBOOKCENTRAL_ocn780972091 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
110609s2005 vtu o 000 0 eng |
040 |
|
|
|a AU@
|b eng
|e pn
|c AU@
|d OCLCO
|d IDEBK
|d OCLCQ
|d OCLCF
|d EBLCP
|d OCLCQ
|d ZCU
|d MERUC
|d OCLCQ
|d OCLCA
|d OCLCQ
|d ICG
|d OCLCQ
|d DKC
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 815528814
|a 823828853
|a 823898578
|a 824089865
|a 824136585
|a 935230497
|a 935246516
|
020 |
|
|
|a 9780080489520
|
020 |
|
|
|a 0080489524
|
020 |
|
|
|a 1281035564
|
020 |
|
|
|a 9781281035561
|
029 |
0 |
|
|a AU@
|b 000048761574
|
029 |
1 |
|
|a DEBBG
|b BV044082951
|
035 |
|
|
|a (OCoLC)780972091
|z (OCoLC)815528814
|z (OCoLC)823828853
|z (OCoLC)823898578
|z (OCoLC)824089865
|z (OCoLC)824136585
|z (OCoLC)935230497
|z (OCoLC)935246516
|
050 |
|
4 |
|a QA76.9.A25 .P46 2006eb
|
072 |
|
7 |
|a UTN
|2 bicssc
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Faircloth, Jeremy.
|
245 |
1 |
0 |
|a Penetration Tester's Open Source Toolkit.
|
260 |
|
|
|a Burlington :
|b Syngress Publishing,
|c 2005.
|
300 |
|
|
|a 1 online resource (736 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Preliminaries; Contents; Chapter 1 Reconnaissance; Chapter 2 Enumeration and Scanning; Chapter 3 Introduction to Testing Databases; Chapter 4 Web Server & Web Application Testing; Chapter 5 Wireless Penetration Testing Using Auditor; Chapter 6 Network Devices; Chapter 7 Writing Open Source Security Tools; Chapter 8 Nessus; Chapter 9 Coding for Nessus; Chapter 10 Nasl Extensions and Custom Tests; Chapter 11 Understanding the Extended Capabilities of the Nessus Environment; Chapter 12 Extending Metasploit I; Chapter 13 Extending Metasploit Ii.; Index.
|
520 |
|
|
|a Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This book provides both the art and the science. The authors of the book are expert penetration testers who have developed many of the leading pen testing tools; such as the Metasploit framework. The authors allow the reader "inside their heads" to unravel the mysteries of thins like identifying targ.
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Computer science.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
2 |
|a Electronic Data Processing
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Informatique.
|
650 |
|
7 |
|a Computer science
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Beale, Jay.
|
700 |
1 |
|
|a Temmingh, Roelof.
|
700 |
1 |
|
|a Meer, Haroon.
|
700 |
1 |
|
|a Van der Walt, Charl.
|
700 |
1 |
|
|a Moore, HD.
|
758 |
|
|
|i has work:
|a Penetration tester's open source toolkit (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCFTcDmY469gT4gxp7qCpvb
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Faircloth, Jeremy.
|t Penetration Tester's Open Source Toolkit.
|d Burlington : Syngress Publishing, ©2005
|z 9781597490214
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=254834
|z Texto completo
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL254834
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n 103556
|
994 |
|
|
|a 92
|b IZTAP
|