|
|
|
|
LEADER |
02279nmm a2200373 u 4500 |
001 |
EB001920042 |
003 |
EBX01000000000000001082944 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Gupta, Sunil
|
245 |
0 |
0 |
|a Ethical hacking
|b learning the basics
|c Sunil Gupta
|
260 |
|
|
|a [Place of publication not identified]
|b Apress
|c 2018
|
300 |
|
|
|a 1 streaming video file (1 hr., 5 min., 27 sec.)
|
653 |
|
|
|a Hacking / fast / (OCoLC)fst01909643
|
653 |
|
|
|a Penetration testing (Computer security) / fast / (OCoLC)fst01789566
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Piratage informatique
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a Computer networks / Security measures / fast / (OCoLC)fst00872341
|
653 |
|
|
|a Tests d'intrusion
|
653 |
|
|
|a Computer security / fast / (OCoLC)fst00872484
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Hacking / http://id.loc.gov/authorities/subjects/sh2013002597
|
653 |
|
|
|a Penetration testing (Computer security) / http://id.loc.gov/authorities/subjects/sh2011003137
|
653 |
|
|
|a Computer security / http://id.loc.gov/authorities/subjects/sh90001862
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
500 |
|
|
|a Title from resource description page (Safari, viewed January 18, 2019)
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781484243480/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 000
|
520 |
|
|
|a "The video is divided into six sections, covering various aspects of ethical hacking for a beginner to grasp. Starting with an introduction to the basics of ethical hacking, you will go through common terminologies used and also learn to install your first virtual machine. You will then take a look at various Linux terminal commands and also learn to perform basic operations with them. The following sections will introduce footprinting and vulnerability scanning, where you will learn how these processes work by going through examples. In conclusion, you will learn what exploitation is and how a minor vulnerability in the system can lead to a breach."--Resource description page
|