Cargando…

Penetration testing with the Metasploit Framework : a quickstart guide to White Hat security discovery and exploitation /

"An essential requirement for protecting any organization's computer and network systems from adversarial attack is finding the vulnerabilities in those systems before the bad guys do. In this course, cybersecurity expert Ric Messier shows you how to use Metasploit, the open source, multi-...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Messier, Ric (Orador)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly, [2016]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000Ii 4500
001 OR_ocn961944633
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 161102s2016 xx 203 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d TOH  |d OCLCF  |d OCLCQ  |d OCLCO 
035 |a (OCoLC)961944633 
037 |a CL0500000798  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Messier, Ric,  |e speaker. 
245 1 0 |a Penetration testing with the Metasploit Framework :  |b a quickstart guide to White Hat security discovery and exploitation /  |c with Ric Messier. 
264 1 |a [Place of publication not identified] :  |b O'Reilly,  |c [2016] 
300 |a 1 online resource (1 streaming video file (3 hr., 22 min., 54 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
511 0 |a Presenter, Ric Messier. 
500 |a Title from title screen (viewed November 2, 2016). 
500 |a Date of publication from resource description page. 
520 |a "An essential requirement for protecting any organization's computer and network systems from adversarial attack is finding the vulnerabilities in those systems before the bad guys do. In this course, cybersecurity expert Ric Messier shows you how to use Metasploit, the open source, multi-platform (Linux, Windows, Mac OS) exploit framework deployed by systems administrators and security engineers everywhere to spot those vulnerabilities. You'll learn how to download, install, and configure the software; how to extend Metasploit; how to perform system reconnaissance and vulnerability identification missions; how to use exploits; and the basics of social engineering attacks, such as phishing and site cloning."--Resource description page. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Metasploit (Electronic resource) 
630 0 7 |a Metasploit (Electronic resource)  |2 fast  |0 (OCoLC)fst01787159 
650 0 |a Penetration testing (Computer security) 
650 6 |a Tests d'intrusion. 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
856 4 0 |u https://learning.oreilly.com/videos/~/9781491972045/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP