|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_ocn962414155 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr ||||||||||| |
008 |
160912s2016 maua ob 001 0 eng d |
040 |
|
|
|a NLE
|b eng
|e rda
|e pn
|c NLE
|d OCLCO
|d OPELS
|d UPM
|d OCLCQ
|d OTZ
|d MERER
|d OCLCQ
|d D6H
|d U3W
|d OCLCF
|d OCLCQ
|d UMI
|d STF
|d TOH
|d CEF
|d KSU
|d YDX
|d UKMGB
|d S2H
|d OCLCO
|d OCLCQ
|d SFB
|d OCLCQ
|d OCLCO
|
015 |
|
|
|a GBB6C7920
|2 bnb
|
016 |
7 |
|
|a 018009404
|2 Uk
|
019 |
|
|
|a 986540201
|a 1032649129
|
020 |
|
|
|a 9780128054734
|q (electronic bk.)
|
020 |
|
|
|a 0128054735
|q (electronic bk.)
|
020 |
|
|
|a 9780128054727
|q (electronic bk.)
|
020 |
|
|
|a 0128054727
|q (electronic bk.)
|
029 |
1 |
|
|a CHBIS
|b 011069457
|
029 |
1 |
|
|a CHNEW
|b 001026578
|
029 |
1 |
|
|a CHVBK
|b 499783239
|
029 |
1 |
|
|a GBVCP
|b 1004856792
|
029 |
1 |
|
|a UKMGB
|b 018009404
|
035 |
|
|
|a (OCoLC)962414155
|z (OCoLC)986540201
|z (OCoLC)1032649129
|
037 |
|
|
|a 9780128054734
|b Ingram Content Group
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.28
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Andress, Jason,
|e author.
|
245 |
1 |
0 |
|a Coding for penetration testers :
|b building better tools /
|c Jason Andress, Ryan Linn.
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a Rockland :
|b Syngress,
|c 2016.
|
300 |
|
|
|a 1 online resource :
|b illustrations (black and white)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
336 |
|
|
|a still image
|b sti
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Previous edition: 2012.
|
500 |
|
|
|a Includes index.
|
500 |
|
|
|a Intro to Command Shell Scripting Intro to Python Intro to Perl Intro to Ruby Intro to Web Scripting with PHP Manipulating Windows with Powershell Scanner Scripting Information Gathering Exploitation Scripting Post-Exploitation Scripting.
|
588 |
0 |
|
|a CIP data; item not viewed.
|
520 |
|
|
|a Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.
|
504 |
|
|
|a Includes bibliographical references and index.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures
|x Testing.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
700 |
1 |
|
|a Linn, Ryan,
|e author.
|
776 |
0 |
8 |
|i Print version:
|z 9780128054727
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780128054734/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 13159980
|
994 |
|
|
|a 92
|b IZTAP
|