|
|
|
|
LEADER |
00000cgm a22000007a 4500 |
001 |
OR_on1139769442 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cnu|||||||| |
007 |
vz czazuu |
008 |
171219s2019 xx --- vleng |
040 |
|
|
|a AU@
|b eng
|c AU@
|d UMI
|d OCLCF
|d UAB
|d HS0
|d TOH
|d OCLCO
|d OCLCQ
|d Q2U
|
019 |
|
|
|a 1157318743
|a 1179392518
|a 1226046024
|a 1232117926
|a 1235779335
|a 1256307985
|a 1300697481
|a 1303289000
|a 1305893036
|a 1315794449
|a 1328607070
|a 1395821341
|
020 |
|
|
|z 9781839210495
|
020 |
|
|
|a 1839210494
|
020 |
|
|
|a 9781839210495
|
024 |
8 |
|
|a 9781839210495
|
029 |
0 |
|
|a AU@
|b 000066491373
|
035 |
|
|
|a (OCoLC)1139769442
|z (OCoLC)1157318743
|z (OCoLC)1179392518
|z (OCoLC)1226046024
|z (OCoLC)1232117926
|z (OCoLC)1235779335
|z (OCoLC)1256307985
|z (OCoLC)1300697481
|z (OCoLC)1303289000
|z (OCoLC)1305893036
|z (OCoLC)1315794449
|z (OCoLC)1328607070
|z (OCoLC)1395821341
|
037 |
|
|
|a CL0501000114
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Percival, Rob,
|e author.
|
245 |
1 |
4 |
|a The Complete Ethical Hacking Course
|h [electronic resource] /
|c Percival, Rob.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b Packt Publishing,
|c 2019.
|
300 |
|
|
|a 1 online resource (1 video file, approximately 31 hr., 30 min.)
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a video file
|
520 |
|
|
|a Protect yourself from hackers and cyber attacks. Master penetration testing + build security and coding tools with Python. About This Video Kali Linux tools Basic Linux commands Fundamental ethical hacking attacks and protection methods Learn Metasploit and Python In Detail This course is highly practical and is divided into several sections, each of which aims to achieve a specific goal; the goal is usually to hack into a specific system so that you can practice all the skills and techniques you learn in real-time. You'll start by setting up an ethical hacking lab on your computer. Here you can put the theory you learn to the test and have a safe space to practice using hacking tools and attacks. We'll experience real-time hacking examples and learn how to protect ourselves against these attacks at the same time! In this course, you'll learn: How hackers launch attacks on different systems, computers, users, websites, and wireless networks What tools hackers use, why, and how they work How to protect yourself (or your clients!) against these attacks How to build your security and hacking tools with Python-from scratch and with no programming experience necessary! How to create your own ethical hacking tool portfolio. In the relevant sections, you'll learn about subjects such as Kali Linux, Wireshark, Maltego, net discover, MSFC, Trojan, Backdoor, Veil, Metasploitable, SQLi, MITMf, Crunch, Meterpreter, Beef, Apache, Nmap, SQLMap, Python, Socket, Scapy, Pynput, Keylogger, and more. We start with practical information without excessive detail and progress accordingly without neglecting the theory at the end.
|
538 |
|
|
|a Mode of access: World Wide Web.
|
542 |
|
|
|f Packt Publishing
|g 2019
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
|
|
|a Online resource; Title from title screen (viewed September 20, 2019)
|
511 |
0 |
|
|a Presenters, Rob Percival, Atil Samancioglu.
|
533 |
|
|
|a Electronic reproduction.
|b Boston, MA :
|c Safari.
|n Available via World Wide Web.,
|d 2019.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
655 |
|
4 |
|a Electronic videos.
|
700 |
1 |
|
|a Samancioglu, Atil,
|e author.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
776 |
0 |
|
|z 1839210494
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781839210495/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|