|
|
|
|
LEADER |
00000cgm a2200000Ii 4500 |
001 |
OR_ocn961944633 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
161102s2016 xx 203 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d TOH
|d OCLCF
|d OCLCQ
|d OCLCO
|
035 |
|
|
|a (OCoLC)961944633
|
037 |
|
|
|a CL0500000798
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Messier, Ric,
|e speaker.
|
245 |
1 |
0 |
|a Penetration testing with the Metasploit Framework :
|b a quickstart guide to White Hat security discovery and exploitation /
|c with Ric Messier.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly,
|c [2016]
|
300 |
|
|
|a 1 online resource (1 streaming video file (3 hr., 22 min., 54 sec.))
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
511 |
0 |
|
|a Presenter, Ric Messier.
|
500 |
|
|
|a Title from title screen (viewed November 2, 2016).
|
500 |
|
|
|a Date of publication from resource description page.
|
520 |
|
|
|a "An essential requirement for protecting any organization's computer and network systems from adversarial attack is finding the vulnerabilities in those systems before the bad guys do. In this course, cybersecurity expert Ric Messier shows you how to use Metasploit, the open source, multi-platform (Linux, Windows, Mac OS) exploit framework deployed by systems administrators and security engineers everywhere to spot those vulnerabilities. You'll learn how to download, install, and configure the software; how to extend Metasploit; how to perform system reconnaissance and vulnerability identification missions; how to use exploits; and the basics of social engineering attacks, such as phishing and site cloning."--Resource description page.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Metasploit (Electronic resource)
|
630 |
0 |
7 |
|a Metasploit (Electronic resource)
|2 fast
|0 (OCoLC)fst01787159
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781491972045/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|