|
|
|
|
LEADER |
02680nmm a2200409 u 4500 |
001 |
EB001954198 |
003 |
EBX01000000000000001117100 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Revay, Geri
|
245 |
0 |
0 |
|a Web hacking
|b become a professional web pentester
|c Geri Revay
|
260 |
|
|
|a [Place of publication not identified]
|b Packt Publishing
|c 2019
|
300 |
|
|
|a 1 streaming video file (7 hr., 51 min., 6 sec.)
|
653 |
|
|
|a Hacking / fast / (OCoLC)fst01909643
|
653 |
|
|
|a Penetration testing (Computer security) / fast / (OCoLC)fst01789566
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Piratage informatique
|
653 |
|
|
|a Computer networks / Security measures / http://id.loc.gov/authorities/subjects/sh94001277
|
653 |
|
|
|a Computer networks / Security measures / fast / (OCoLC)fst00872341
|
653 |
|
|
|a Tests d'intrusion
|
653 |
|
|
|a Internet / Sécurité / Mesures
|
653 |
|
|
|a Internet / Security measures / fast / (OCoLC)fst01751426
|
653 |
|
|
|a Computer security / fast / (OCoLC)fst00872484
|
653 |
|
|
|a Réseaux d'ordinateurs / Sécurité / Mesures
|
653 |
|
|
|a Hacking / http://id.loc.gov/authorities/subjects/sh2013002597
|
653 |
|
|
|a Penetration testing (Computer security) / http://id.loc.gov/authorities/subjects/sh2011003137
|
653 |
|
|
|a Internet / Security measures
|
653 |
|
|
|a Computer security / http://id.loc.gov/authorities/subjects/sh90001862
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
500 |
|
|
|a Title from resource description page (Safari, viewed May 14, 2019)
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781838822644/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 331
|
082 |
0 |
|
|a 000
|
520 |
|
|
|a "This course contains everything to start working as a web pentester. You will learn about exploitation techniques, hacking tools, methodologies, and the whole process of security assessments. It is absolutely hands-on, you will do all the attacks in your own penetration testing environment using the provided applications. The targets are real open-source software. You will have to work hard but in the end, you will be able to do web security assessments on your own as a real ethical hacker. My name is Geri and I am the instructor of this course about web application hacking. If you are interested in hacking and IT security, then this is the perfect place to start. You might be a developer, an IT administrator, or basically anybody with an IT background. With this training, you will get everything you need to start working as a professional web penetration tester."--Resource description page
|