|
|
|
|
LEADER |
00000cgm a2200000Ii 4500 |
001 |
OR_ocn934650428 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
160113s2015 xx 266 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d OCLCA
|d UAB
|d OCLCO
|d OCLCQ
|
035 |
|
|
|a (OCoLC)934650428
|
037 |
|
|
|a CL0500000701
|b Safari Books Online
|
082 |
0 |
4 |
|a 005.8
|q OCoLC
|2 23/eng/20230216
|
090 |
|
|
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Messier, Ric,
|e speaker.
|
245 |
1 |
0 |
|a Introduction to penetration testing :
|b finding and analyzing vulnerabilities in systems and networks with Kali Linux /
|c with Ric Messier.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly,
|c 2015.
|
300 |
|
|
|a 1 online resource (1 streaming video file (4 hr., 25 min., 13 sec.)) :
|b digital, sound, color
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
511 |
0 |
|
|a Presenter, Ric Messier.
|
500 |
|
|
|a Title from title screen (viewed January 11, 2016).
|
500 |
|
|
|a Date of publication from resource description page.
|
520 |
|
|
|a "In this Introduction to Penetration Testing training course, expert author Ric Messier will teach you how to find and analyze vulnerabilities in systems and networks with Kali Linux. This course is designed for the absolute beginner, meaning no penetration testing experience is required. You will start by learning about reconnaissance, including DNS, using job sites, social networking investigation, and using Wireshark filters. From there, Ric will teach you about scanning and vulnerability analysis, including setting up and starting an OpenVAS scan, ExploitDB, and vulnerability research using CVEs. This video tutorial also covers Metasploit, including adding hosts to the database, using Metasploit for scans, and exploits with Metasploit. Finally, you will learn about website testing. Once you have completed this computer based training course, you will have learned how to find and analyze vulnerabilities in systems and networks with Kali Linux."--Resource description page.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Kali Linux.
|
630 |
0 |
7 |
|a Kali Linux.
|2 fast
|0 (OCoLC)fst01914587
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer security
|x Evaluation.
|
650 |
|
0 |
|a Computer software
|x Testing.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Sécurité informatique
|x Évaluation.
|
650 |
|
7 |
|a Computer security
|x Evaluation.
|2 fast
|0 (OCoLC)fst00872488
|
650 |
|
7 |
|a Computer software
|x Testing.
|2 fast
|0 (OCoLC)fst00872601
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781771375245/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|