|
|
|
|
LEADER |
00000cam a2200000Ia 4500 |
001 |
SCIDIR_ocn854754137 |
003 |
OCoLC |
005 |
20231117044910.0 |
006 |
m o d |
007 |
cr mn||||||||| |
008 |
130731s2013 maua ob 001 0 eng d |
040 |
|
|
|a HKP
|b eng
|e pn
|c HKP
|d OCLCO
|d UIU
|d B24X7
|d UMI
|d COO
|d TEF
|d DEBBG
|d GGVRL
|d DEBSZ
|d OCLCA
|d OCLCF
|d OCL
|d OCLCQ
|d AGLDB
|d K6U
|d OCLCQ
|d U3W
|d D6H
|d OCLCQ
|d CEF
|d INT
|d OCLCQ
|d UAB
|d C6I
|d BRF
|d EYM
|d OCLCO
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 865474276
|a 1060196866
|a 1179575629
|a 1194774849
|
020 |
|
|
|a 9780124046184
|
020 |
|
|
|a 0124046185
|
020 |
|
|
|z 1597499935
|q (print)
|
020 |
|
|
|z 9781597499934
|q (print)
|
035 |
|
|
|a (OCoLC)854754137
|z (OCoLC)865474276
|z (OCoLC)1060196866
|z (OCoLC)1179575629
|z (OCoLC)1194774849
|
050 |
|
4 |
|a TK5105.59
|b .W544 2013eb
|
082 |
0 |
4 |
|a 005.8068
|2 23
|
100 |
1 |
|
|a Wilhelm, Thomas.
|
245 |
1 |
0 |
|a Professional penetration testing :
|b creating and learning in a hacking lab /
|c Thomas Wilhelm ; Matthew Neely, technical editor.
|
246 |
3 |
|
|a Creating and learning in a hacking lab
|
250 |
|
|
|a 2nd ed.
|
260 |
|
|
|a Waltham, Mass. :
|b Syngress,
|c �2013.
|
300 |
|
|
|a 1 online resource (xvii, 445 pages) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
|
|a Chapter 1. Introduction -- chapter 2. Ethics and hacking -- chapter 3. Setting up your lab -- chapter 4. Methodologies and frameworks -- chapter 5. Pentest project management -- chapter 6. Information gathering -- chapter 7. Vulnerability identification -- chapter 8. Vulnerability exploitation -- chapter 9. Local system attacks -- chapter 10. Privilege escalation -- chapter 11. Targeting support systems -- chapter 12. Targeting the network -- chapter 13. Web application attack techniques -- chapter 14. Reporting results -- chapter 15. Hacking as a career.
|
520 |
|
|
|a This book walks through the entire process of setting up and running a penetration testing lab for the purpose of testing a computer network to find security vulnerabilities before they are maliciously exploited. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting, and management practices.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Penetration testing (Computer security)
|
650 |
|
0 |
|a Computer networks
|x Testing.
|
650 |
|
0 |
|a Hackers.
|
650 |
|
6 |
|a R�eseaux d'ordinateurs
|x S�ecurit�e
|x Mesures.
|0 (CaQQLa)201-0263812
|
650 |
|
6 |
|a Tests d'intrusion.
|0 (CaQQLa)000274128
|
650 |
|
6 |
|a Pirates informatiques.
|0 (CaQQLa)201-0279206
|
650 |
|
7 |
|a Hackers
|2 fast
|0 (OCoLC)fst00872150
|
650 |
|
7 |
|a Computer networks
|x Security measures
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer networks
|x Testing
|2 fast
|0 (OCoLC)fst00872352
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
700 |
1 |
|
|a Neely, Matthew.
|4 edt
|
776 |
0 |
8 |
|i Print version:
|a Wilhelm, Thomas.
|t Professional penetration testing.
|b 2nd ed.
|d Waltham, Mass. : Syngress, �2013
|z 9781597499934
|
856 |
4 |
0 |
|u https://sciencedirect.uam.elogim.com/science/book/9781597499934
|z Texto completo
|