|
|
|
|
LEADER |
00000cam a2200000 a 4500 |
001 |
EBSCO_on1085179774 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
190209s2019 enk ob 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d TEFOD
|d CHVBK
|d OCLCO
|d TEFOD
|d OCLCF
|d UKMGB
|d YDX
|d OCLCQ
|d N$T
|d SFB
|d OCLCQ
|d OCLCO
|d K6U
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB978958
|2 bnb
|
016 |
7 |
|
|a 019247281
|2 Uk
|
019 |
|
|
|a 1084499206
|a 1084696396
|a 1151196213
|
020 |
|
|
|a 1789340616
|
020 |
|
|
|a 9781789340617
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000065066019
|
029 |
1 |
|
|a CHNEW
|b 001040193
|
029 |
1 |
|
|a CHVBK
|b 559038569
|
029 |
1 |
|
|a UKMGB
|b 019247281
|
029 |
1 |
|
|a AU@
|b 000065270638
|
035 |
|
|
|a (OCoLC)1085179774
|z (OCoLC)1084499206
|z (OCoLC)1084696396
|z (OCoLC)1151196213
|
037 |
|
|
|a 196694A5-A180-4C00-8951-E3E665EF6F6B
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|b .V458 2019
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Velu, Vijay Kumar.
|
245 |
1 |
0 |
|a Mastering Kali Linux for Advanced Penetration Testing :
|b Secure Your Network with Kali Linux 2019. 1 - the Ultimate White Hat Hackers' Toolkit.
|
250 |
|
|
|a 3rd ed.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing Ltd,
|c 2019.
|
300 |
|
|
|a 1 online resource (540 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references.
|
505 |
0 |
|
|a Goal-Based Penetration Testing with Kali Linux -- Open Source Intelligence and Passive Reconnaissance -- Active Reconnaissance of the External and Internal Networks -- Vulnerability Assessment -- Advanced Social Engineering and Physical Security -- Wireless Attacks -- Exploiting Web-Based Applications -- Client-Side Exploitation -- By-Passing Security Controls -- Exploitation -- Action on the Objective and Lateral Movement -- Privilege Escalation -- Command and Control -- Embedded and RFID Hacking.
|
520 |
|
|
|a A practical guide to testing your infrastructure security with Kali Linux, the preferred choice of pentesters and hackers. This book takes you, as a tester or security practitioner, through the reconnaissance, vulnerability assessment, exploitation, privilege escalation, and post-exploitation activities used by pentesters.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer networks.
|
650 |
|
2 |
|a Computer Communication Networks
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs.
|
650 |
|
7 |
|a Computer networks
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
700 |
1 |
|
|a Beggs, Robert.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2014794
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5662705
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2014794
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 16023604
|
994 |
|
|
|a 92
|b IZTAP
|