|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1128449047 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
191214s2019 enk o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d UKAHL
|d TEFOD
|d N$T
|d OCLCF
|d OCLCQ
|d ESU
|d NLW
|d OCLCO
|d OCLCQ
|d NZAUC
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 1789612624
|
020 |
|
|
|a 9781789612622
|q (electronic bk.)
|
029 |
1 |
|
|a AU@
|b 000070045785
|
035 |
|
|
|a (OCoLC)1128449047
|
037 |
|
|
|a 357B3BCF-779B-4ED7-BF55-AEAAC1B4A5E4
|b OverDrive, Inc.
|n http://www.overdrive.com
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Singh, Glen D.
|
245 |
1 |
0 |
|a Learn Kali Linux 2019 :
|b Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark.
|
260 |
|
|
|a Birmingham :
|b Packt Publishing, Limited,
|c 2019.
|
300 |
|
|
|a 1 online resource (536 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Print version record.
|
520 |
|
|
|a The current trend of various hacking and security breaches displays how important it has become to pentest your environment, to ensure end point protection. This book will take you through the latest version of Kali Linux to efficiently deal with various crucial security aspects such as confidentiality, integrity, access control and authentication.
|
505 |
0 |
|
|a Learn Kali Linux 2019: perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Kali Linux Basics -- 1: Introduction to Hacking -- 2: Setting Up Kali -- Part 1 -- 3: Setting Up Kali -- Part 2 -- 4: Getting Comfortable with Kali Linux 2019 -- Section 2: Reconnaissance -- 5: Passive Information Gathering -- 6: Active Information Gathering -- Section 3: Vulnerability Assessment and Penetration Testing with Kali Linux 2019 -- 7: Working with Vulnerability Scanners -- 8: Understanding Network Penetration Testing -- 9: Network Penetration Testing -- Pre-Connection Attacks -- 10: Network Penetration Testing -- Gaining Access -- 11: Network Penetration Testing -- Post-Connection Attacks -- 12: Network Penetration Testing -- Detection and Security -- 13: Client-Side Attacks -- Social Engineering -- 14: Performing Website Penetration Testing -- 15: Website Penetration Testing -- Gaining Access -- 16: Best Practices -- Assessments -- Other Books You May Enjoy -- Index.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
630 |
0 |
0 |
|a Kali Linux.
|
630 |
0 |
7 |
|a Kali Linux
|2 fast
|
650 |
|
7 |
|a Linux.
|2 bicssc
|
650 |
|
7 |
|a Computer networking & communications.
|2 bicssc
|
650 |
|
7 |
|a Computer security.
|2 bicssc
|
650 |
|
7 |
|a Computers
|x Networking
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Operating Systems
|x Linux.
|2 bisacsh
|
650 |
|
7 |
|a Computers
|x Security
|x General.
|2 bisacsh
|
776 |
0 |
8 |
|i Print version:
|a Singh, Glen D.
|t Learn Kali Linux 2019 : Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark.
|d Birmingham : Packt Publishing, Limited, ©2019
|z 9781789611809
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2297944
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH36854556
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5979319
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 2297944
|
994 |
|
|
|a 92
|b IZTAP
|