|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
EBOOKCENTRAL_on1108551773 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
190713s2019 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d TEFOD
|d EBLCP
|d TEFOD
|d OCLCF
|d OCLCQ
|d UKAHL
|d YDX
|d UKMGB
|d OCLCQ
|d N$T
|d OCLCO
|d K6U
|d OCLCQ
|d OCLCO
|d OCLCL
|d TMA
|d OCLCQ
|
015 |
|
|
|a GBB9E1185
|2 bnb
|
016 |
7 |
|
|a 019459159
|2 Uk
|
019 |
|
|
|a 1106370073
|
020 |
|
|
|a 1838826904
|
020 |
|
|
|a 9781838826901
|q (electronic bk.)
|
029 |
1 |
|
|a CHNEW
|b 001059294
|
029 |
1 |
|
|a CHVBK
|b 569758971
|
029 |
1 |
|
|a UKMGB
|b 019459159
|
029 |
1 |
|
|a AU@
|b 000068845976
|
029 |
1 |
|
|a AU@
|b 000065958779
|
035 |
|
|
|a (OCoLC)1108551773
|z (OCoLC)1106370073
|
037 |
|
|
|a 09F96B14-96CA-4570-9F97-C3A2567D19DD
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Rahalkar, Sagar.
|
245 |
1 |
4 |
|a The Complete Metasploit Guide :
|b Explore Effective Penetration Testing Techniques with Metasploit.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing, Limited,
|c 2019.
|
300 |
|
|
|a 1 online resource (651 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure ...
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
630 |
0 |
0 |
|a Metasploit (Electronic resource)
|
630 |
0 |
7 |
|a Metasploit (Electronic resource)
|2 fast
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
700 |
1 |
|
|a Jaswal, Nipun.
|
758 |
|
|
|i has work:
|a The complete Metasploit guide (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGPmGtbdphDYcXjkbXJdgq
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Rahalkar, Sagar.
|t Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit.
|d Birmingham : Packt Publishing, Limited, ©2019
|z 9781838822477
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5802136
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36438661
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5802136
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 300663855
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2177837
|
994 |
|
|
|a 92
|b IZTAP
|