Metasploit toolkit for penetration testing, exploit development, and vulnerability research /
Metasploit is the #5 most commonly used network security tool according to a poll conducted by www.insecure.org, yet there are no books.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Burlington, MA :
Syngress,
©2007.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | EBSCO_ocn190823231 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 080115s2007 maua ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d IDEBK |d ZCU |d E7B |d OCLCQ |d MERUC |d OCLCQ |d OCLCF |d OPELS |d BTCTA |d BAKER |d DKDLA |d UMI |d DEBSZ |d DEBBG |d OCLCQ |d REB |d OCLCO |d OCL |d OCLCQ |d OCLCO |d COO |d AGLDB |d Z5A |d OCLCQ |d JBG |d OCLCO |d OCLCA |d D6H |d UAB |d OCLCQ |d VTS |d CEF |d WYU |d STF |d LEAUB |d AU@ |d VT2 |d BRF |d OCLCQ |d OCLCO |d VLY |d M8D |d OCLCO |d OCLCQ |d UPM |d OCLCQ | ||
019 | |a 150340931 |a 162131454 |a 488134762 |a 507326483 |a 647691380 |a 871201833 |a 1065648017 |a 1103280372 |a 1113449870 |a 1129356693 |a 1152971928 |a 1160093229 |a 1162026345 |a 1179507728 |a 1192333906 |a 1206316405 |a 1240518843 | ||
020 | |a 9780080549255 |q (electronic bk.) | ||
020 | |a 008054925X |q (electronic bk.) | ||
020 | |a 9781597490740 |q (pbk.) | ||
020 | |a 1597490741 |q (pbk.) | ||
020 | |a 1281112585 | ||
020 | |a 9781281112583 | ||
020 | |a 9786611112585 | ||
020 | |a 6611112588 | ||
029 | 1 | |a AU@ |b 000051554545 | |
029 | 1 | |a CHBIS |b 005829172 | |
029 | 1 | |a CHNEW |b 001007386 | |
029 | 1 | |a CHVBK |b 168434458 | |
029 | 1 | |a DEBBG |b BV039828843 | |
029 | 1 | |a DEBBG |b BV042031837 | |
029 | 1 | |a DEBBG |b BV042314244 | |
029 | 1 | |a DEBBG |b BV043043826 | |
029 | 1 | |a DEBSZ |b 405304765 | |
029 | 1 | |a DEBSZ |b 414172965 | |
029 | 1 | |a DEBSZ |b 42215721X | |
029 | 1 | |a GBVCP |b 802415296 | |
029 | 1 | |a NZ1 |b 12059934 | |
029 | 1 | |a NZ1 |b 15189217 | |
029 | 1 | |a NZ1 |b 15698219 | |
029 | 1 | |a AU@ |b 000054163875 | |
035 | |a (OCoLC)190823231 |z (OCoLC)150340931 |z (OCoLC)162131454 |z (OCoLC)488134762 |z (OCoLC)507326483 |z (OCoLC)647691380 |z (OCoLC)871201833 |z (OCoLC)1065648017 |z (OCoLC)1103280372 |z (OCoLC)1113449870 |z (OCoLC)1129356693 |z (OCoLC)1152971928 |z (OCoLC)1160093229 |z (OCoLC)1162026345 |z (OCoLC)1179507728 |z (OCoLC)1192333906 |z (OCoLC)1206316405 |z (OCoLC)1240518843 | ||
037 | |a 133683:133808 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a QA76.9.A25 |b M396 2007eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 22 |
049 | |a UAMI | ||
100 | 1 | |a Maynor, David. | |
245 | 1 | 0 | |a Metasploit toolkit for penetration testing, exploit development, and vulnerability research / |c David Maynor, K.K. Mookhey. |
260 | |a Burlington, MA : |b Syngress, |c ©2007. | ||
300 | |a 1 online resource (xvi, 272 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Front Cover; Metasploit Toolkit: For Penetration Testing, Exploit Development, and Vulnerability Reasearch; Copyright Page; Contents; Chapter 1. Introduction to Metasploit; Chapter 2. Architecture, Environment, and Installation; Chapter 3. Metasploit Framework and Advanced Environment Configurations; Chapter 4. Advanced Payloads and Add-on Modules; Chapter 5. Adding New Payloads; Case Studies; Appendix A. Advantages of Network Vulnerability Testing with Metasploit 3.0; Appendix B. Building a Test Lab for Penetration Testing; Appendix C. Glossary of Technology and Terminology; Index. | |
520 | |a Metasploit is the #5 most commonly used network security tool according to a poll conducted by www.insecure.org, yet there are no books. | ||
546 | |a English. | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
630 | 0 | 0 | |a Metasploit (Electronic resource) |
630 | 0 | 7 | |a Metasploit (Electronic resource) |2 fast |0 (OCoLC)fst01787159 |
650 | 0 | |a Computer security. | |
650 | 0 | |a Open source software. | |
650 | 2 | |a Computer Security | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Logiciels libres. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security. |2 fast |0 (OCoLC)fst00872484 | |
650 | 7 | |a Open source software. |2 fast |0 (OCoLC)fst01046097 | |
700 | 1 | |a Mookhey, K. K. | |
776 | 0 | 8 | |i Print version: |a Maynor, David. |t Metasploit toolkit for penetration testing, exploit development, and vulnerability research. |d Burlington, MA : Syngress, ©2007 |z 1597490741 |z 9781597490740 |w (DLC) 2007299879 |w (OCoLC)173084169 |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214743 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781597490740/?ar |z Texto completo |
938 | |a Baker & Taylor |b BKTY |c 59.95 |d 44.96 |i 1597490741 |n 0006736969 |s active | ||
938 | |a Baker and Taylor |b BTCP |n BK0006736969 | ||
938 | |a ebrary |b EBRY |n ebr10204226 | ||
938 | |a EBSCOhost |b EBSC |n 214743 | ||
938 | |a YBP Library Services |b YANK |n 2758394 | ||
994 | |a 92 |b IZTAP |