|
|
|
|
LEADER |
00000cgm a2200000 i 4500 |
001 |
OR_on1038802238 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
180606s2018 xx 722 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d UAB
|d ERF
|d OCLCO
|d OCLCQ
|d OCLCO
|
029 |
1 |
|
|a AU@
|b 000067116620
|
035 |
|
|
|a (OCoLC)1038802238
|
037 |
|
|
|a CL0500000969
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Sabih, Zaid,
|e on-screen presenter.
|
245 |
1 |
0 |
|a Learn social engineering from scratch /
|c Zaid Sabih.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Packt Publishing,
|c 2018.
|
300 |
|
|
|a 1 online resource (1 streaming video file (12 hr., 1 min., 15 sec.))
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
511 |
0 |
|
|a Presenter, Zaid Sabih.
|
500 |
|
|
|a Title from resource description page (Safari, viewed June 5, 2018).
|
520 |
|
|
|a "Welcome to this comprehensive course on social engineering! In this course, you will start as a beginner with no previous knowledge about penetration testing or hacking, we will start with the basics of social engineering, and by end of it you'll be at an advanced level being able to hack into all major operating systems (Windows, OS X, and Linux), generate different types of trojans, and deliver them using smart social engineering techniques. This course is focused on the practical side of penetration testing without neglecting the theory. Before jumping into penetration testing, you will first learn how to set up a lab and install needed software to practice penetration testing safely on your own machine. Finally, at the end of the course, you will learn how to protect yourself and your systems from these attacks. All the attacks in this course are practical attacks that work against real computers. In each technique you will understand the theory behind it and how it works, then you'll learn how to use that technique in a real-life scenario, so by the end of the course you'll be able to modify these techniques or combine them to come up with more powerful attacks and adapt them to different scenarios and different operating systems."--Resource description page
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Social engineering.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Ingénierie sociale.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
650 |
|
7 |
|a Social engineering.
|2 fast
|0 (OCoLC)fst01122444
|
655 |
|
4 |
|a Electronic videos.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781789341584/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|