|
|
|
|
LEADER |
00000cgm a2200000 i 4500 |
001 |
OR_on1060617388 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
181102s2018 xx 440 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d TOH
|d OCLCF
|d ERF
|d OCLCO
|d OCLCQ
|d OCLCO
|
029 |
1 |
|
|a AU@
|b 000067118163
|
035 |
|
|
|a (OCoLC)1060617388
|
037 |
|
|
|a CL0501000003
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Gupta, Sunil,
|e speaker.
|
245 |
1 |
0 |
|a Ethical hacking masterclass /
|c Sunil Gupta.
|
246 |
3 |
|
|a Ethical hacking master class
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Packt Publishing,
|c 2018.
|
300 |
|
|
|a 1 online resource (1 streaming video file (7 hr., 19 min., 10 sec.))
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
511 |
0 |
|
|a Presenter, Sunil Gupta.
|
500 |
|
|
|a Title from resource description page (Safari, viewed October 31, 2018).
|
520 |
|
|
|a "Security is the foremost concern for all organizations both big and small. Hacking doesn't always mean damage, invasion of privacy, or stealing confidential data. There exists an ethic to it too! For everyone interested in using hacking to find loopholes in their systems and strengthen them, Ethical Hacking is the answer. The movement toward the cloud and Virtualization has led to an increased level of threats and thus the demand for Ethical Hackers. This action-packed course provides information on all the latest hacking tools in one place. You'll learn all the latest tools and features such as network pentesting, website pentesting, and Android pentesting. By the end of the course you'll have mastered Ethical Hacking and will be able to easily pass the examination to be a Certified Ethical Hacker."--Resource description page
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Hacking.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Hacking.
|2 fast
|0 (OCoLC)fst01909643
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
655 |
|
4 |
|a Electronic videos.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781789530018/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|