|
|
|
|
LEADER |
00000cgm a2200000 i 4500 |
001 |
OR_on1023436608 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
180215s2018 xx 401 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d OCLCA
|d S9I
|d UAB
|d ERF
|d OCLCO
|d OCLCQ
|d OCLCO
|
029 |
1 |
|
|a AU@
|b 000067115979
|
029 |
1 |
|
|a AU@
|b 000073487079
|
035 |
|
|
|a (OCoLC)1023436608
|
037 |
|
|
|a CL0500000939
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Messier, Ric,
|e on-screen presenter.
|
245 |
1 |
0 |
|a Security testing and ethical hacking with Kali Linux /
|c with Ric Messier.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly,
|c [2018]
|
300 |
|
|
|a 1 online resource (1 streaming video file (6 hr., 40 min., 43 sec.))
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a data file
|
380 |
|
|
|a Videorecording
|
511 |
0 |
|
|a Presenter, Ric Messier.
|
500 |
|
|
|a Title from title screen (viewed February 15, 2018).
|
500 |
|
|
|a Date of publication from resource description page.
|
520 |
|
|
|a "Analysts and engineers performing security testing or penetration testing are typically expected to deliver a report at the end of their work. In this video, created for entry-to-intermediate-level security engineers, you'll learn to use the Kali Linux toolsets that help you handle three major tasks associated with producing such reports. First, you'll learn about the Kali tools that let you manipulate and manage the sometimes overwhelming volume of data that security and penetration test generate. Second, you'll learn about the Kali tools that help you capture and organize your test notes before integrating them into your reports. Third, you'll learn about the Kali tools that let you collaborate with your security colleagues to collect, manage, and prepare comprehensive reports. Participants should have access to Kali Linux before starting this course."--Resource description page
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
630 |
0 |
0 |
|a Kali Linux.
|
630 |
0 |
7 |
|a Kali Linux.
|2 fast
|0 (OCoLC)fst01914587
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer security
|x Evaluation.
|
650 |
|
0 |
|a Computer software
|x Testing.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Sécurité informatique
|x Évaluation.
|
650 |
|
7 |
|a Computer security
|x Evaluation.
|2 fast
|0 (OCoLC)fst00872488
|
650 |
|
7 |
|a Computer software
|x Testing.
|2 fast
|0 (OCoLC)fst00872601
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
655 |
|
4 |
|a Electronic videos.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781492029328/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|