|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1011595255 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
171115s2015 flua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d STF
|d CDX
|d OCLCF
|d TOH
|d COO
|d CEF
|d KSU
|d OCLCQ
|d DEBBG
|d C6I
|d UAB
|d K6U
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCQ
|d SFB
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 902835628
|
020 |
|
|
|a 9781315145891
|
020 |
|
|
|a 1315145898
|
020 |
|
|
|a 9781351381345
|
020 |
|
|
|a 1351381342
|
020 |
|
|
|a 1482231611
|
020 |
|
|
|a 9781482231618
|
020 |
|
|
|a 9781322638591
|
020 |
|
|
|a 1322638594
|
020 |
|
|
|z 9781138436824
|
020 |
|
|
|z 9781482231618
|
029 |
1 |
|
|a AU@
|b 000061338739
|
029 |
1 |
|
|a AU@
|b 000065168605
|
029 |
1 |
|
|a GBVCP
|b 1014935202
|
035 |
|
|
|a (OCoLC)1011595255
|z (OCoLC)902835628
|
037 |
|
|
|a CL0500000912
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
084 |
|
|
|a COM053000
|a COM043000
|a LAW041000
|2 bisacsh
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Baloch, Rafay,
|e author.
|
245 |
1 |
0 |
|a Ethical hacking and penetration testing guide /
|c Rafay Baloch.
|
264 |
|
1 |
|a Boca Raton :
|b CRC Press,
|c [2015]
|
264 |
|
4 |
|c ©2015
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed November 14, 2017).
|
500 |
|
|
|a "An Auerbach book."
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Introduction to hacking -- Linux basics -- Information gathering techniques -- Target enumeration and port scanning techniques -- Vulnerability assessment -- Network sniffing -- Remote exploitation -- Client side exploitation -- Postexploitation -- Windows exploit development basics -- Wireless hacking -- Web hacking.
|
520 |
|
|
|a "This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security."--
|c Provided by publisher
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a COMPUTERS
|x Networking
|x General.
|2 bisacsh
|
650 |
|
7 |
|a LAW
|x Forensic Science.
|2 bisacsh
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781351381345/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Coutts Information Services
|b COUT
|n 30548598
|
994 |
|
|
|a 92
|b IZTAP
|