Cargando…

Security testing and ethical hacking with Kali Linux /

"Analysts and engineers performing security testing or penetration testing are typically expected to deliver a report at the end of their work. In this video, created for entry-to-intermediate-level security engineers, you'll learn to use the Kali Linux toolsets that help you handle three...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly, [2018]
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1023436608
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 180215s2018 xx 401 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d OCLCA  |d S9I  |d UAB  |d ERF  |d OCLCO  |d OCLCQ  |d OCLCO 
029 1 |a AU@  |b 000067115979 
029 1 |a AU@  |b 000073487079 
035 |a (OCoLC)1023436608 
037 |a CL0500000939  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Messier, Ric,  |e on-screen presenter. 
245 1 0 |a Security testing and ethical hacking with Kali Linux /  |c with Ric Messier. 
264 1 |a [Place of publication not identified] :  |b O'Reilly,  |c [2018] 
300 |a 1 online resource (1 streaming video file (6 hr., 40 min., 43 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
380 |a Videorecording 
511 0 |a Presenter, Ric Messier. 
500 |a Title from title screen (viewed February 15, 2018). 
500 |a Date of publication from resource description page. 
520 |a "Analysts and engineers performing security testing or penetration testing are typically expected to deliver a report at the end of their work. In this video, created for entry-to-intermediate-level security engineers, you'll learn to use the Kali Linux toolsets that help you handle three major tasks associated with producing such reports. First, you'll learn about the Kali tools that let you manipulate and manage the sometimes overwhelming volume of data that security and penetration test generate. Second, you'll learn about the Kali tools that help you capture and organize your test notes before integrating them into your reports. Third, you'll learn about the Kali tools that let you collaborate with your security colleagues to collect, manage, and prepare comprehensive reports. Participants should have access to Kali Linux before starting this course."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
630 0 0 |a Kali Linux. 
630 0 7 |a Kali Linux.  |2 fast  |0 (OCoLC)fst01914587 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer security  |x Evaluation. 
650 0 |a Computer software  |x Testing. 
650 6 |a Tests d'intrusion. 
650 6 |a Sécurité informatique  |x Évaluation. 
650 7 |a Computer security  |x Evaluation.  |2 fast  |0 (OCoLC)fst00872488 
650 7 |a Computer software  |x Testing.  |2 fast  |0 (OCoLC)fst00872601 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
655 4 |a Electronic videos. 
856 4 0 |u https://learning.oreilly.com/videos/~/9781492029328/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP