MARC

LEADER 00000cam a2200000Mu 4500
001 EBSCO_on1004201785
003 OCoLC
005 20231017213018.0
006 m o d
007 cr |n|---|||||
008 170916s2016 enk o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d MERUC  |d IDB  |d NLE  |d OCLCO  |d OCLCF  |d OCLCQ  |d OCLCO  |d IDEBK  |d YDX  |d OCLCQ  |d LVT  |d N$T  |d OCLCQ  |d OCLCO  |d LOY  |d UKAHL  |d K6U  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 1004363940  |a 1004545117  |a 1051032781 
020 |a 1784394254 
020 |a 9781784394257  |q (electronic bk.) 
020 |z 1784390305 
029 1 |a CHNEW  |b 000974809 
029 1 |a CHVBK  |b 503252832 
035 |a (OCoLC)1004201785  |z (OCoLC)1004363940  |z (OCoLC)1004545117  |z (OCoLC)1051032781 
037 |a 1036129  |b MIL 
050 4 |a QA76.9.A25  |b .S385 2017eb 
082 0 4 |a 005.8 
049 |a UAMI 
100 1 |a Schultz, Corey,  |e author. 
245 1 0 |a Kali Linux Cookbook - Second Edition. 
250 |a 2nd ed. 
260 |a Birmingham :  |b Packt Publishing,  |c 2016. 
300 |a 1 online resource (430 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Print version record. 
505 0 |a Cover ; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Customer Feedback; Table of Contents; Preface; Chapter 1: Installing Kali and the Lab Setup; Introduction; Lab architecture and considerations; How to do it ... ; The hypervisor selection; The hypervisor networking; Vulnerable workstations; Installing VirtualBox; Getting ready; How to do it ... ; How it works ... ; Installing Kali on VirtualBox; Getting ready; How to do it ... ; Using Kali Linux from bootable media; Getting ready; How to do it ... ; Upgrading Kali Linux; Getting ready; How to do it ... ; There's more. 
505 8 |a Apt-listchanges: news sectionThe configuring macchanger; The service restart; Understanding the advanced customization and optimization of Kali; Getting ready; How to do it ... ; Upgrading the Linux kernel; Removing unneeded packages; Adjusting or disabling the screen lock; Correcting the Ethernet interface configuration; Connecting and disconnecting Ethernet interfaces; Installing Windows machines; Getting ready; Installing Metasploitable; Getting ready; How to do it ... ; Installing OWASP-BWA; Getting ready; How to do it ... ; Understanding hack me and other online resources; There's more ... 
505 8 |a Chapter 2: Reconnaissance and ScanningIntroduction; Using KeepNote to organize our data; Getting ready; How to do it ... ; There's more ... ; Getting up and running with Maltego CE; Getting ready; How to do it ... ; There's more ... ; Gathering domain information; Getting ready; How to do it ... ; There's more ... ; Gathering public IP information; Getting ready; How to do it ... ; Gathering external routing information; Getting ready; How to do it ... ; Gathering internal routing information; Getting ready; How to do it ... ; There's more ... ; Gathering cloud service information; Getting ready. 
505 8 |a How to do it ... Identifying network hosts; Getting ready; How to do it ... ; A simple subnet scan; Scan all the TCP ports of a host; Performing a TCP SYN scan; Performing a UDP port scan; The nmap output formats; Profiling hosts; Getting ready; How to do it ... ; Operating systems and service detection; Aggressive service detection; There's more ... ; Identifying whether there is a web application firewall; Getting ready; How to do it ... ; Using SNMP to gather more information; Getting ready; How to do it ... ; There's more ... ; Chapter 3: Vulnerability Analysis; Introduction. 
505 8 |a Installation and configuration of OpenVASGetting ready; How to do it ... ; A basic vulnerability scanning with OpenVAS; Getting ready; How to do it ... ; Advanced vulnerability scanning with OpenVAS; Getting ready; How to do it ... ; Installation and Configuration of Nessus; Getting ready; How to do it ... ; A basic vulnerability scanning with Nessus; Getting ready; How to do it ... ; Advanced vulnerability scanning with Nessus; Getting ready; How to do it ... ; The installation and configuration of Nexpose; Getting ready; How to do it ... ; Basic vulnerability scanning with Nexpose; Getting ready. 
500 |a How to do it ... 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
630 0 0 |a Kali Linux. 
630 0 7 |a Kali Linux  |2 fast 
650 0 |a Information technology  |x Security measures. 
650 0 |a Computer security  |x Management. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data protection. 
650 0 |a Penetration testing (Computer security) 
650 6 |a Technologie de l'information  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique  |x Gestion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Protection de l'information (Informatique) 
650 6 |a Tests d'intrusion. 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |x Management  |2 fast 
650 7 |a Data protection  |2 fast 
650 7 |a Information technology  |x Security measures  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
700 1 |a Perciaccante, Bob,  |e author. 
776 0 8 |i Print version:  |a Schultz, Corey P.  |t Kali Linux Cookbook - Second Edition.  |d Birmingham : Packt Publishing, ©2016 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1621701  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH30656360 
938 |a EBL - Ebook Library  |b EBLB  |n EBL5046633 
938 |a EBSCOhost  |b EBSC  |n 1621701 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis34518235 
938 |a YBP Library Services  |b YANK  |n 14807798 
994 |a 92  |b IZTAP