Cargando…

Ethical hacking : learning the basics /

"The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Gupta, Sunil (Orador)
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Apress, 2018.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000 i 4500
001 OR_on1083130726
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 190122s2018 xx 066 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d OCLCQ  |d OCLCO 
035 |a (OCoLC)1083130726 
037 |a CL0501000019  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Gupta, Sunil,  |e speaker. 
245 1 0 |a Ethical hacking :  |b learning the basics /  |c Sunil Gupta. 
264 1 |a [Place of publication not identified] :  |b Apress,  |c 2018. 
300 |a 1 online resource (1 streaming video file (1 hr., 5 min., 27 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
511 0 |a Presenter, Sunil Gupta. 
500 |a Title from resource description page (Safari, viewed January 18, 2019). 
520 |a "The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a look at various Linux terminal commands and also learn to perform basic operations with them. The following sections will introduce footprinting and vulnerability scanning, where you will learn how these processes work by going through examples. In conclusion, you will learn what exploitation is and how a minor vulnerability in the system can lead to a breach."--Resource description page 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Hacking. 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Piratage informatique. 
650 6 |a Tests d'intrusion. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Hacking.  |2 fast  |0 (OCoLC)fst01909643 
650 7 |a Penetration testing (Computer security)  |2 fast  |0 (OCoLC)fst01789566 
856 4 0 |u https://learning.oreilly.com/videos/~/9781484243480/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP