|
|
|
|
LEADER |
00000cgm a2200000 i 4500 |
001 |
OR_on1112253839 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
190815t20192018xx 216 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d UMI
|d OCLCF
|d OCLCQ
|d OCLCO
|
029 |
1 |
|
|a AU@
|b 000071520202
|
035 |
|
|
|a (OCoLC)1112253839
|
037 |
|
|
|a CL0501000065
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Santos, Omar,
|e on-screen presenter.
|
245 |
1 |
0 |
|a Enterprise penetration testing and continuous monitoring (The art of hacking series) :
|b LiveLessons /
|c Omar Santos.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Cisco Press :
|b Pearson,
|c 2019.
|
264 |
|
4 |
|c ©2018
|
300 |
|
|
|a 1 online resource (1 streaming video file (3 hr., 35 min., 48 sec.))
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a LiveLessons
|
511 |
0 |
|
|a Presenter, Omar Santos.
|
500 |
|
|
|a Title from resource description page (Safari, viewed August 13, 2019).
|
520 |
|
|
|a "Enterprise Penetration Testing and Continuous Monitoring LiveLessons, part of The Art of Hacking video series, provides step-by-step, real-life complex scenarios of performing security assessments (penetration testing) of enterprise networks using internal/external reconnaissance, social engineering, and network and vulnerability scanning. You also learn how to perform web app testing, internal network testing, privilege escalation, password cracking, and data exfiltration to probe for and mitigate enterprise vulnerabilities. The course concludes with a look at reporting and evaluation methods to ensure that your enterprise environment stays secure from ever-evolving threats and security vulnerabilities."--Resource description page
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Hacking.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Hacking.
|2 fast
|0 (OCoLC)fst01909643
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
830 |
|
0 |
|a LiveLessons (Indianapolis, Ind.)
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9780134854779/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|