|
|
|
|
LEADER |
00000cam a2200000Mu 4500 |
001 |
EBSCO_on1004201785 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
170916s2016 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d MERUC
|d IDB
|d NLE
|d OCLCO
|d OCLCF
|d OCLCQ
|d OCLCO
|d IDEBK
|d YDX
|d OCLCQ
|d LVT
|d N$T
|d OCLCQ
|d OCLCO
|d LOY
|d UKAHL
|d K6U
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1004363940
|a 1004545117
|a 1051032781
|
020 |
|
|
|a 1784394254
|
020 |
|
|
|a 9781784394257
|q (electronic bk.)
|
020 |
|
|
|z 1784390305
|
029 |
1 |
|
|a CHNEW
|b 000974809
|
029 |
1 |
|
|a CHVBK
|b 503252832
|
035 |
|
|
|a (OCoLC)1004201785
|z (OCoLC)1004363940
|z (OCoLC)1004545117
|z (OCoLC)1051032781
|
037 |
|
|
|a 1036129
|b MIL
|
050 |
|
4 |
|a QA76.9.A25
|b .S385 2017eb
|
082 |
0 |
4 |
|a 005.8
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Schultz, Corey,
|e author.
|
245 |
1 |
0 |
|a Kali Linux Cookbook - Second Edition.
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing,
|c 2016.
|
300 |
|
|
|a 1 online resource (430 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover ; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Customer Feedback; Table of Contents; Preface; Chapter 1: Installing Kali and the Lab Setup; Introduction; Lab architecture and considerations; How to do it ... ; The hypervisor selection; The hypervisor networking; Vulnerable workstations; Installing VirtualBox; Getting ready; How to do it ... ; How it works ... ; Installing Kali on VirtualBox; Getting ready; How to do it ... ; Using Kali Linux from bootable media; Getting ready; How to do it ... ; Upgrading Kali Linux; Getting ready; How to do it ... ; There's more.
|
505 |
8 |
|
|a Apt-listchanges: news sectionThe configuring macchanger; The service restart; Understanding the advanced customization and optimization of Kali; Getting ready; How to do it ... ; Upgrading the Linux kernel; Removing unneeded packages; Adjusting or disabling the screen lock; Correcting the Ethernet interface configuration; Connecting and disconnecting Ethernet interfaces; Installing Windows machines; Getting ready; Installing Metasploitable; Getting ready; How to do it ... ; Installing OWASP-BWA; Getting ready; How to do it ... ; Understanding hack me and other online resources; There's more ...
|
505 |
8 |
|
|a Chapter 2: Reconnaissance and ScanningIntroduction; Using KeepNote to organize our data; Getting ready; How to do it ... ; There's more ... ; Getting up and running with Maltego CE; Getting ready; How to do it ... ; There's more ... ; Gathering domain information; Getting ready; How to do it ... ; There's more ... ; Gathering public IP information; Getting ready; How to do it ... ; Gathering external routing information; Getting ready; How to do it ... ; Gathering internal routing information; Getting ready; How to do it ... ; There's more ... ; Gathering cloud service information; Getting ready.
|
505 |
8 |
|
|a How to do it ... Identifying network hosts; Getting ready; How to do it ... ; A simple subnet scan; Scan all the TCP ports of a host; Performing a TCP SYN scan; Performing a UDP port scan; The nmap output formats; Profiling hosts; Getting ready; How to do it ... ; Operating systems and service detection; Aggressive service detection; There's more ... ; Identifying whether there is a web application firewall; Getting ready; How to do it ... ; Using SNMP to gather more information; Getting ready; How to do it ... ; There's more ... ; Chapter 3: Vulnerability Analysis; Introduction.
|
505 |
8 |
|
|a Installation and configuration of OpenVASGetting ready; How to do it ... ; A basic vulnerability scanning with OpenVAS; Getting ready; How to do it ... ; Advanced vulnerability scanning with OpenVAS; Getting ready; How to do it ... ; Installation and Configuration of Nessus; Getting ready; How to do it ... ; A basic vulnerability scanning with Nessus; Getting ready; How to do it ... ; Advanced vulnerability scanning with Nessus; Getting ready; How to do it ... ; The installation and configuration of Nexpose; Getting ready; How to do it ... ; Basic vulnerability scanning with Nexpose; Getting ready.
|
500 |
|
|
|a How to do it ...
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
630 |
0 |
0 |
|a Kali Linux.
|
630 |
0 |
7 |
|a Kali Linux
|2 fast
|
650 |
|
0 |
|a Information technology
|x Security measures.
|
650 |
|
0 |
|a Computer security
|x Management.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Technologie de l'information
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique
|x Gestion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|x Management
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
650 |
|
7 |
|a Information technology
|x Security measures
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
700 |
1 |
|
|a Perciaccante, Bob,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Schultz, Corey P.
|t Kali Linux Cookbook - Second Edition.
|d Birmingham : Packt Publishing, ©2016
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1621701
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH30656360
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL5046633
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1621701
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis34518235
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14807798
|
994 |
|
|
|a 92
|b IZTAP
|