Cargando…

The art of hacking : self paced traning kit for cyber security professionals /

"Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Pearson, 2018.
Colección:LiveLessons.
Art of hacking.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1023864042
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 180222s2018 xx 313 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d OCLCA  |d S9I  |d UAB  |d OCLCQ  |d OCLCO 
035 |a (OCoLC)1023864042 
037 |a CL0500000941  |b Safari Books Online 
050 4 |a TK5105.59 
049 |a UAMI 
100 1 |a Santos, Omar,  |e on-screen presenter. 
245 1 4 |a The art of hacking :  |b self paced traning kit for cyber security professionals /  |c Y. Anto. 
264 1 |a [Place of publication not identified] :  |b Pearson,  |c 2018. 
300 |a 1 online resource (1 streaming video file (5 hr., 12 min., 42 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a data file 
380 |a Videorecording 
490 1 |a LiveLessons 
490 1 |a The art of hacking series 
500 |a Title from title screen (Safari, viewed February 22, 2018). 
500 |a Release date from resource description page (Safari, viewed February 22, 2018). 
511 0 |a Presenter, Omar Santos. 
520 |a "Wireless Networks, IoT, and Mobile Devices Hacking provides step-by-step real-life, advanced scenarios of performing security assessments (penetration testing) of wireless networks and how to perform security posture assessments of Internet of Things (IoT) technologies and solutions. You also learn how to perform security posture assessments of mobile devices, such as smartphones, tablets, and wearables. Get step-by-step guidance so you can learn ethical hacking, penetration testing, and security posture assessment. You also learn the various concepts associated with many different leading-edge offensive security skills in the industry. Full of multimedia tutorials and hands-on demos that users can apply to real-world scenarios, this is a must for anyone interested in pursuing an ethical hacking career."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Hackers  |v Handbooks, manuals, etc. 
650 0 |a Computer security  |v Handbooks, manuals, etc. 
650 0 |a Computer networks  |x Security measures  |v Handbooks, manuals, etc. 
650 6 |a Pirates informatiques  |v Guides, manuels, etc. 
650 6 |a Sécurité informatique  |v Guides, manuels, etc. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures  |v Guides, manuels, etc. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Hackers.  |2 fast  |0 (OCoLC)fst00872150 
655 2 |a Handbook 
655 7 |a Handbooks and manuals.  |2 fast  |0 (OCoLC)fst01423877 
655 7 |a Handbooks and manuals.  |2 lcgft 
655 7 |a Guides et manuels.  |2 rvmgf 
830 0 |a LiveLessons. 
830 0 |a Art of hacking. 
856 4 0 |u https://learning.oreilly.com/videos/~/9780134854632/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP