Cargando…

Ethical hacking : understanding how the good guys find system and web app vulnerabilities before the bad guys do /

"Ethical hacking, or security testing, is the art and science of finding the flaws in an organization's network systems or web applications. Identifying those vulnerabilities can give the organization a fighting chance to fix them before the bad guys find them. This course is a hands-on ov...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Messier, Ric (Orador)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly, [2017]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000Ii 4500
001 OR_ocn982064399
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 170410s2017 xx 295 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d TOH  |d OCLCF  |d UAB  |d OCLCO 
035 |a (OCoLC)982064399 
037 |a CL0500000846  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Messier, Ric,  |e speaker. 
245 1 0 |a Ethical hacking :  |b understanding how the good guys find system and web app vulnerabilities before the bad guys do /  |c with Ric Messier. 
246 3 0 |a Understanding how the good guys find system and web app vulnerabilities before the bad guys do 
264 1 |a [Place of publication not identified] :  |b O'Reilly,  |c [2017] 
300 |a 1 online resource (1 streaming video file (4 hr., 54 min., 19 sec.)) :  |b digital, sound, color 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from title screen (viewed April 10, 2017). 
511 0 |a Presenter, Ric Messier. 
520 |a "Ethical hacking, or security testing, is the art and science of finding the flaws in an organization's network systems or web applications. Identifying those vulnerabilities can give the organization a fighting chance to fix them before the bad guys find them. This course is a hands-on overview of the open source tools that information security professionals use to conduct professional caliber penetration tests. Prerequisites include a basic understanding of the ways network systems and operating systems work, basic familiarity with Linux, the ability to run virtual machines (VMWare, etc.) so you can set up attack systems and target systems, and a computer that's ready to run Kali Linux and Metasploit software."--Resource description page. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Penetration testing (Computer security) 
650 6 |a Tests d'intrusion. 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
856 4 0 |u https://learning.oreilly.com/videos/~/9781491978375/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP