|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1232111966 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cn||||||||| |
007 |
vz czazuu |
008 |
090920s2020 xx --- o vleng d |
040 |
|
|
|a NZCPL
|b eng
|c NZCPL
|d OCLCO
|d HS0
|d ERF
|d OCLCF
|d OCLCO
|d OCLCQ
|d DST
|
019 |
|
|
|a 1225998157
|a 1226039283
|a 1300494088
|a 1303346551
|
020 |
|
|
|z 9781800564848
|
024 |
8 |
|
|a 9781800564848
|
029 |
1 |
|
|a AU@
|b 000068857794
|
035 |
|
|
|a (OCoLC)1232111966
|z (OCoLC)1225998157
|z (OCoLC)1226039283
|z (OCoLC)1300494088
|z (OCoLC)1303346551
|
036 |
|
|
|b CCLOReilly
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Krahenbill, Cliff,
|
245 |
1 |
0 |
|a Ethical Hacking - Capture the Flag Walkthroughs - v2 /
|c Krahenbill, Cliff.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b Packt Publishing,
|c 2020.
|
300 |
|
|
|a 1 online resource (1 streaming video file, approximately 1 hr., 38 min.)
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a video file
|
500 |
|
|
|a Not recommended for use on the libraries' public computers.
|
520 |
|
|
|a Explore capture-the-flag exercises that will strengthen your ethical hacking skills About This Video Get to grips with recon, enumeration, gaining access, and post-exploitation Delve into the virtual install of Kali Linux using VirtualBox Learn the concepts of Toppo, Lampiao, DC-1 and SickOS 1.1 In Detail Ethical Hacking - Capture the Flag Walkthroughs v2 picks up where v1 left off using all-new capture-the-flag exercises, step-by-step video tutorials, and more. This course will guide you on how to use pentesting tools in the real world. You'll get up to speed with Python, PHP scripting, and more. As you progress, you'll be guided through each of the capture-the-flag (CTF) walkthroughs, learning everything, from how to footprint a target to how to enumerate the target for possible vulnerabilities. You'll also be able to analyze the vulnerabilities and exploit the target to gain root access. Each section demonstrates advanced techniques and different attack vectors used by professional pentesters and hackers. By the end of this course, you'll have gained a solid understanding of ethical hacking and how to use the essential pentesting tools in the real world.
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
655 |
|
4 |
|a Electronic videos.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
776 |
0 |
|
|z 1800564848
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781800564848/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
936 |
|
|
|a BATCHLOAD
|
994 |
|
|
|a 92
|b IZTAP
|