Hacking with Kali : practical penetration testing techniques /
This book provides detailed explanations of the complete Linux penetration testing lifecycle, complete linkage of the Kali information, resources and distribution downloads, and hands-on exercises that reinforce the topics discussed.
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam ; Boston :
Syngress,
2014.
|
Edición: | 1st ed. |
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Ia 4500 | ||
---|---|---|---|
001 | EBSCO_ocn870340083 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 140212s2014 maua ob 001 0 eng d | ||
010 | |a 2013045051 | ||
040 | |a UMI |b eng |e pn |c UMI |d UKMGB |d OCLCO |d N$T |d COO |d DEBBG |d GGVRL |d B24X7 |d DEBSZ |d EBLCP |d OPELS |d YDXCP |d UPM |d OCLCF |d OCLCQ |d OCLCO |d OCLCQ |d TEFOD |d IDEBK |d OCLCQ |d ICA |d AGLDB |d K6U |d PIFAG |d FVL |d ZCU |d LIV |d MERUC |d OCLCQ |d OCLCO |d U3W |d D6H |d STF |d OCLCQ |d VTS |d CEF |d ICG |d INT |d VT2 |d AU@ |d OCLCQ |d OCLCO |d WYU |d G3B |d TKN |d OCLCQ |d OCLCO |d DKC |d OCLCQ |d OCLCO |d VLY |d QGK |d OCLCO |d OCLCQ |d OCLCO | ||
016 | 7 | |a 016521889 |2 Uk | |
019 | |a 861361399 |a 865329755 |a 865657695 |a 966386091 |a 1055384313 |a 1066041817 |a 1081235256 |a 1103273524 |a 1129353704 |a 1153048538 |a 1162573706 |a 1192347651 |a 1228592080 |a 1240510199 |a 1241924723 |a 1295610595 |a 1300553039 | ||
020 | |a 9780124078833 |q (electronic bk.) | ||
020 | |a 0124078834 |q (electronic bk.) | ||
020 | |a 1306195705 |q (ebk) | ||
020 | |a 9781306195706 |q (ebk) | ||
020 | |z 0124077498 | ||
020 | |z 9780124077492 | ||
029 | 1 | |a AU@ |b 000053308481 | |
029 | 1 | |a AU@ |b 000054755466 | |
029 | 1 | |a AU@ |b 000060585161 | |
029 | 1 | |a CHNEW |b 000898683 | |
029 | 1 | |a CHNEW |b 001000939 | |
029 | 1 | |a CHNEW |b 001026516 | |
029 | 1 | |a DEBBG |b BV041783850 | |
029 | 1 | |a DEBBG |b BV042314372 | |
029 | 1 | |a DEBBG |b BV044062445 | |
029 | 1 | |a DEBSZ |b 404335616 | |
029 | 1 | |a DEBSZ |b 405352433 | |
029 | 1 | |a DEBSZ |b 431307830 | |
029 | 1 | |a DEBSZ |b 481279571 | |
029 | 1 | |a DKDLA |b 820120-katalog:000656810 | |
029 | 1 | |a GBVCP |b 814103731 | |
029 | 1 | |a NZ1 |b 15342333 | |
029 | 1 | |a NZ1 |b 15953289 | |
029 | 1 | |a CHVBK |b 601687132 | |
029 | 1 | |a CHNEW |b 001092654 | |
029 | 1 | |a DKDLA |b 820120-katalog:999942323205765 | |
035 | |a (OCoLC)870340083 |z (OCoLC)861361399 |z (OCoLC)865329755 |z (OCoLC)865657695 |z (OCoLC)966386091 |z (OCoLC)1055384313 |z (OCoLC)1066041817 |z (OCoLC)1081235256 |z (OCoLC)1103273524 |z (OCoLC)1129353704 |z (OCoLC)1153048538 |z (OCoLC)1162573706 |z (OCoLC)1192347651 |z (OCoLC)1228592080 |z (OCoLC)1240510199 |z (OCoLC)1241924723 |z (OCoLC)1295610595 |z (OCoLC)1300553039 | ||
037 | |a B1146DE5-6722-4950-9407-739B7A8FA1FF |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 0 | 4 | |a 005.8 |2 23 |
049 | |a UAMI | ||
100 | 1 | |a Broad, James. | |
245 | 1 | 0 | |a Hacking with Kali : |b practical penetration testing techniques / |c James Broad, Andrew Bindner. |
250 | |a 1st ed. | ||
260 | |a Amsterdam ; |a Boston : |b Syngress, |c 2014. | ||
300 | |a 1 online resource (ix, 227 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Introduction -- Download and install Kali Linux -- Software, patches, and upgrades -- Configuring Kali Linux -- Building a penetration testing lab -- Introduction to the penetration test -- Reconnaissance -- Scanning -- Exploitation -- Maintaining access -- Reports and templates -- Appendix A: Tribal Chicken -- Appendix B: Kali penetration testing tools. | |
520 | |a This book provides detailed explanations of the complete Linux penetration testing lifecycle, complete linkage of the Kali information, resources and distribution downloads, and hands-on exercises that reinforce the topics discussed. | ||
546 | |a English. | ||
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
630 | 0 | 0 | |a Kali Linux. |
630 | 0 | 7 | |a Kali Linux. |2 blmlsh |
630 | 0 | 7 | |a Kali Linux |2 fast |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer networks |x Security measures. | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
700 | 1 | |a Bindner, Andrew. | |
776 | 0 | 8 | |i Print version: |a Broad, James. |t Hacking with Kali. |b 1st ed. |d Waltham, MA : Syngress, 2014 |z 9780124078833 |w (OCoLC)853505666 |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=516105 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9780124077492/?ar |z Texto completo |
938 | |a Books 24x7 |b B247 |n bks00058866 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1115177 | ||
938 | |a EBSCOhost |b EBSC |n 516105 | ||
938 | |a Cengage Learning |b GVRL |n GVRL6ZMY | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis26997466 | ||
938 | |a YBP Library Services |b YANK |n 11421836 | ||
994 | |a 92 |b IZTAP |