Cargando…

The Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit.

This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perf...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Rahalkar, Sagar
Otros Autores: Jaswal, Nipun
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Birmingham : Packt Publishing, Limited, 2019.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Ma 4500
001 EBOOKCENTRAL_on1108551773
003 OCoLC
005 20240329122006.0
006 m o d
007 cr cnu---unuuu
008 190713s2019 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d TEFOD  |d EBLCP  |d TEFOD  |d OCLCF  |d OCLCQ  |d UKAHL  |d YDX  |d UKMGB  |d OCLCQ  |d N$T  |d OCLCO  |d K6U  |d OCLCQ  |d OCLCO  |d OCLCL  |d TMA  |d OCLCQ 
015 |a GBB9E1185  |2 bnb 
016 7 |a 019459159  |2 Uk 
019 |a 1106370073 
020 |a 1838826904 
020 |a 9781838826901  |q (electronic bk.) 
029 1 |a CHNEW  |b 001059294 
029 1 |a CHVBK  |b 569758971 
029 1 |a UKMGB  |b 019459159 
029 1 |a AU@  |b 000068845976 
029 1 |a AU@  |b 000065958779 
035 |a (OCoLC)1108551773  |z (OCoLC)1106370073 
037 |a 09F96B14-96CA-4570-9F97-C3A2567D19DD  |b OverDrive, Inc.  |n http://www.overdrive.com 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Rahalkar, Sagar. 
245 1 4 |a The Complete Metasploit Guide :  |b Explore Effective Penetration Testing Techniques with Metasploit. 
260 |a Birmingham :  |b Packt Publishing, Limited,  |c 2019. 
300 |a 1 online resource (651 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
520 |a This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure ... 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
630 0 0 |a Metasploit (Electronic resource) 
630 0 7 |a Metasploit (Electronic resource)  |2 fast 
650 0 |a Penetration testing (Computer security) 
650 6 |a Tests d'intrusion. 
650 7 |a Penetration testing (Computer security)  |2 fast 
700 1 |a Jaswal, Nipun. 
758 |i has work:  |a The complete Metasploit guide (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGPmGtbdphDYcXjkbXJdgq  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Rahalkar, Sagar.  |t Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit.  |d Birmingham : Packt Publishing, Limited, ©2019  |z 9781838822477 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5802136  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH36438661 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5802136 
938 |a YBP Library Services  |b YANK  |n 300663855 
938 |a EBSCOhost  |b EBSC  |n 2177837 
994 |a 92  |b IZTAP