Cargando…

Ethical hacking and penetration testing guide /

"This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Baloch, Rafay (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : CRC Press, [2015]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 i 4500
001 OR_on1011595255
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 171115s2015 flua ob 001 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d STF  |d CDX  |d OCLCF  |d TOH  |d COO  |d CEF  |d KSU  |d OCLCQ  |d DEBBG  |d C6I  |d UAB  |d K6U  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCO 
019 |a 902835628 
020 |a 9781315145891 
020 |a 1315145898 
020 |a 9781351381345 
020 |a 1351381342 
020 |a 1482231611 
020 |a 9781482231618 
020 |a 9781322638591 
020 |a 1322638594 
020 |z 9781138436824 
020 |z 9781482231618 
029 1 |a AU@  |b 000061338739 
029 1 |a AU@  |b 000065168605 
029 1 |a GBVCP  |b 1014935202 
035 |a (OCoLC)1011595255  |z (OCoLC)902835628 
037 |a CL0500000912  |b Safari Books Online 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
084 |a COM053000  |a COM043000  |a LAW041000  |2 bisacsh 
049 |a UAMI 
100 1 |a Baloch, Rafay,  |e author. 
245 1 0 |a Ethical hacking and penetration testing guide /  |c Rafay Baloch. 
264 1 |a Boca Raton :  |b CRC Press,  |c [2015] 
264 4 |c ©2015 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed November 14, 2017). 
500 |a "An Auerbach book." 
504 |a Includes bibliographical references and index. 
505 0 |a Introduction to hacking -- Linux basics -- Information gathering techniques -- Target enumeration and port scanning techniques -- Vulnerability assessment -- Network sniffing -- Remote exploitation -- Client side exploitation -- Postexploitation -- Windows exploit development basics -- Wireless hacking -- Web hacking. 
520 |a "This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security."--  |c Provided by publisher 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Tests d'intrusion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x General.  |2 bisacsh 
650 7 |a LAW  |x Forensic Science.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Penetration testing (Computer security)  |2 fast 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781351381345/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Coutts Information Services  |b COUT  |n 30548598 
994 |a 92  |b IZTAP