Cargando…

Learning Whitehat hacking and penetration testing /

"In this Whitehat Hacking and Penetration testing training course, expert Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and und...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Messier, Ric
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : InfiniteSkills, 2012.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000Ia 4500
001 OR_ocn830000283
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 130314s2012 xx 624 o vleng d
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCF  |d OCLCQ  |d OCLCA  |d UAB  |d OCLCO 
035 |a (OCoLC)830000283 
037 |a CL0500000201  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Messier, Ric. 
245 1 0 |a Learning Whitehat hacking and penetration testing /  |c by Ric Messier. 
260 |a [Place of publication not identified] :  |b InfiniteSkills,  |c 2012. 
300 |a 1 online resource (1 streaming video file (10 hr., 23 min., 34 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from resource description page (viewed Mar. 14, 2013). 
511 0 |a Presenter, Ric Messier. 
520 |a "In this Whitehat Hacking and Penetration testing training course, expert Ric Messier covers the essentials you will need to know to harden and protect your hardware and software to avoid downtime and loss of data. Protecting your networks and customer data are more important that ever, and understanding HOW you are vulnerable is the best way to learn how you can prevent attacks. Some of the topics covered in this course are; researching and background information retrieval, networking fundamentals, a deeper look at TCP/IP and packets, as well as understanding cryptography. You will learn about scanning networks, penetration testing and the use of Metasploit, malware and viruses, DoS and DDoS attacks, web application hacking and securing wireless networks. Finally, you will learn about detection evasion and preventing programming attacks, and much more throughout this video based tutorial. By the time you have completed this video tutorial for Whitehat Hacking and Penetration testing, you will have a deeper understanding of the areas you may be potentially be vulnerable to attack in, as well as the methods that hackers use to exploit your systems, allowing you to better understand how to secure your hardware and data from unethical hackers."--Resource description page. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
856 4 0 |u https://learning.oreilly.com/videos/~/9781771370349/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP