|
|
|
|
LEADER |
02635nmm a2200457 u 4500 |
001 |
EB001948169 |
003 |
EBX01000000000000001111071 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 0124116418
|
020 |
|
|
|a 0124116442
|
020 |
|
|
|a 9780124116412
|
050 |
|
4 |
|a QA76.9
|
100 |
1 |
|
|a Engebretson, Patrick
|
245 |
0 |
0 |
|a The Basics of Hacking and Penetration Testing
|b Ethical Hacking and Penetration Testing Made Easy
|c Patrick Engebretson ; David Kennedy, technical editor
|
250 |
|
|
|a 2nd ed
|
260 |
|
|
|a Waltham, MA
|b Syngress
|c 2013
|
300 |
|
|
|a xviii, 204 pages
|
505 |
0 |
|
|a Includes bibliographical references and index
|
505 |
0 |
|
|a What is Penetration Testing? -- Reconnaissance -- Scanning -- Exploitation -- Social Engineering -- Web-Based Exploitation -- Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter -- Wrapping Up the Penetration Test
|
653 |
|
|
|a Computer security
|
653 |
|
|
|a Pirates informatiques
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Tests d'intrusion
|
653 |
|
|
|a Penetration testing (Computer security) / fast
|
653 |
|
|
|a Hackers / http://id.loc.gov/authorities/subjects/sh94005931
|
653 |
|
|
|a Hackers / fast
|
653 |
|
|
|a Computer software / Testing / fast
|
653 |
|
|
|a Penetration testing (Computer security) / http://id.loc.gov/authorities/subjects/sh2011003137
|
653 |
|
|
|a Computer software / Testing
|
653 |
|
|
|a Computer crimes / Prevention
|
653 |
|
|
|a Computer security / fast
|
653 |
|
|
|a Computer crimes / Prevention / fast
|
653 |
|
|
|a Computer Security
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780124116443/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 364.1
|
082 |
0 |
|
|a 005.8
|
520 |
|
|
|a "The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate."--Supplied by vendor
|