|
|
|
|
LEADER |
00000cgm a2200000 i 4500 |
001 |
OR_on1101443838 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
190516s2019 xx 472 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d TOH
|d OCLCQ
|d OCLCO
|
029 |
1 |
|
|a AU@
|b 000066235902
|
035 |
|
|
|a (OCoLC)1101443838
|
037 |
|
|
|a CL0501000048
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Revay, Geri,
|e on-screen presenter.
|
245 |
1 |
0 |
|a Web hacking :
|b become a professional web pentester /
|c Geri Revay.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Packt Publishing,
|c 2019.
|
300 |
|
|
|a 1 online resource (1 streaming video file (7 hr., 51 min., 6 sec.))
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
511 |
0 |
|
|a Presenter, Geri Revay.
|
500 |
|
|
|a Title from resource description page (Safari, viewed May 14, 2019).
|
520 |
|
|
|a "This course contains everything to start working as a web pentester. You will learn about exploitation techniques, hacking tools, methodologies, and the whole process of security assessments. It is absolutely hands-on, you will do all the attacks in your own penetration testing environment using the provided applications. The targets are real open-source software. You will have to work hard but in the end, you will be able to do web security assessments on your own as a real ethical hacker. My name is Geri and I am the instructor of this course about web application hacking. If you are interested in hacking and IT security, then this is the perfect place to start. You might be a developer, an IT administrator, or basically anybody with an IT background. With this training, you will get everything you need to start working as a professional web penetration tester."--Resource description page
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Hacking.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Internet
|x Security measures.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Internet
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Hacking.
|2 fast
|0 (OCoLC)fst01909643
|
650 |
|
7 |
|a Internet
|x Security measures.
|2 fast
|0 (OCoLC)fst01751426
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
655 |
|
4 |
|a Electronic videos.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781838822644/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|