|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
OR_on1268684693 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr |n||||||||| |
008 |
221014t20212021caua o 001 0 eng d |
040 |
|
|
|a YDX
|b eng
|e rda
|e pn
|c YDX
|d WAU
|d OCLCO
|
020 |
|
|
|a 9781718501881
|q electronic book
|
020 |
|
|
|a 1718501889
|q electronic book
|
020 |
|
|
|z 9781718501874
|q paperback
|
020 |
|
|
|z 1718501870
|q paperback
|
029 |
1 |
|
|a AU@
|b 000071520932
|
035 |
|
|
|a (OCoLC)1268684693
|
050 |
|
4 |
|a QA76.9.A25
|b G685 2021
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Graham, Daniel G.,
|e author.
|
245 |
1 |
0 |
|a Ethical hacking :
|b a hands-on introduction to breaking in /
|c Daniel G. Graham. ; foreword by Juan Gilbert.
|
264 |
|
1 |
|a San Francisco :
|b No Starch Press,
|c [2021]
|
264 |
|
4 |
|c Ã2021
|
300 |
|
|
|a 1 online resource :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
336 |
|
|
|a still image
|b sti
|2 rdacontent
|
337 |
|
|
|a computer
|2 rdamedia
|
338 |
|
|
|a online resource
|2 rdacarrier
|
386 |
|
|
|n nat
|a Americans
|2 lcdgt
|
500 |
|
|
|a Includes index.
|
505 |
0 |
|
|a Setting up -- Capturing traffic with ARP spoofing -- Analyzing capture traffic -- Crafting TCP shells and botnets -- Cryptography and ransomware -- TLS and Diffie-Hellman -- Phishing and deepfakes -- Scanning targets -- Fuzzing and zero-day vulnerabilities -- Building Trojans -- Building and installing Linux rootkits -- Stealing and cracking passwords -- Serious cross-site scripting exploitation -- Pivoting and privilege escalation -- Moving through the Corporate Windows Network -- Next steps.
|
520 |
|
|
|a "A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you'll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You'll begin with the basics: capturing a victim's network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you'll deploy reverse shells that let you remotely run commands on a victim's computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you'll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you'll use to traverse a private network." --
|c Provided by publisher.
|
545 |
0 |
|
|a Dr. Daniel G. Graham is an assistant professor of computer science at the University of Virginia at Charlottesville.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|
776 |
0 |
8 |
|i Print version:
|a Graham, Daniel G.
|t Ethical hacking.
|d San Francisco : No Starch Press, [2021]
|z 9781718501874
|w (DLC) 2021940441
|w (OCoLC)1263805425
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9781098129095/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 302461544
|
994 |
|
|
|a 92
|b IZTAP
|