Toggle navigation
Campus Access
About MPG.eBooks
Skip to content
Search Tips
Home
>
Search: "back tracking"
Language
English
Deutsch
Español
Français
Italiano
日本語
Nederlands
Português
Português (Brasil)
中文(简体)
中文(繁體)
Türkçe
עברית
Gaeilge
Cymraeg
Ελληνικά
Català
Euskara
Русский
Čeština
Suomi
Svenska
polski
Dansk
slovenščina
اللغة العربية
বাংলা
Galego
Tiếng Việt
Hrvatski
हिंदी
All Fields
Title
Person
Topic
ISBN/ISSN
Year
Collection
Advanced
Search alternatives
:
"back tracking" »
"backtracking _"
,
"_ backtracking"
,
"4 backtracking"
Showing
1
-
20
of
22
Search:
'"back tracking"'
,
query time: 0.12s
Book List
0
Sort:
Relevance
Year Descending
Year Ascending
Author
Title
Read Now
1
BackTrack
4 : assuring security by penetration testing
by
Ali, Shakeel
Published 2011
Packt
“
...
BackTrack
four...
”
Call Number:
QA76.9.A25
Read Now
2
Gray hat hacking : the ethical hacker's handbook
by
Harris, Shon
Published 2008
McGraw-Hill
Table of Contents:
“
...Chapter 5 Using the
BackTrack
LiveCD Linux Distribution --
BackTrack
: The Big Picture -- Creating...
”
Call Number:
QA76.9.A25
Read Now
3
Cybersecurity : managing systems, conducting testing, and investigating intrusions
by
Mowbray, Thomas J.
Published 2014
John Wiley & Sons
Table of Contents:
“
...: Customizing
BackTrack
; Creating and Running
BackTrack
Images; Customizing
BackTrack
with VM; Updating...
”
Call Number:
TK5105.59
Read Now
4
Web application vulnerabilities : detect, exploit, prevent
by
Cross, Michael
Published 2007
Syngress Pub.
Table of Contents:
“
...-Based Malware -- Ch. 6. Web Server and Web Application Testing with
BackTrack
-- Ch. 7. Securing Web...
”
Call Number:
QA76.76.A65
Read Now
5
Kismet hacking
by
Haines, Brad
Published 2008
Syngress Pub.
Table of Contents:
“
... and
BackTrack
...
”
Call Number:
TK5103.2
Read Now
6
Linux bible : boot up to Ubuntu, Fedora, KNOPPIX, Debian, SUSE, and 13 other distributions
by
Negus, Chris
Published 2009
Wiley
Table of Contents:
“
...Text -- DVD-ROM: Bootable versions of KNOPPIX, AntiX, Puppy, and
BackTrack
Linux live CDs...
”
Call Number:
QA76.76.O63
Read Now
7
Hooks in Popular Music
by
Byron, Tim
,
O’Regan, Jadey
Published 2022
Palgrave Macmillan
Table of Contents:
“
... -- Chapter 5. Sing it Back: Melody and Topline Hooks -- Chapter 6. D-D-Don’t Don’t Stop The Beat:
Backing
...
”
Read Now
8
Structure, evolution and dynamics of transcriptional regulatory networks
by
Babu, M. Madan
Published 2012
Henry Stewart Talks
Table of Contents:
“
... and expression data --
Back
-
tracking
method to find active sub-networks -Temporal dynamics of local & global...
”
Read Now
9
Linux bible : boot up to Ubuntu, Fedora, KNOPPIX, Debian, openSUSE, and 13 other distributions
by
Negus, Chris
Published 2010
Wiley Pub.
Table of Contents:
“
.../install),
BackTrack
(live), Mandriva One (live/install), AntiX (live/install), INSERT (live), and Puppy...
”
Call Number:
QA76.76.O63
Read Now
10
Exceptional service, exceptional profit : the secrets of building a five-star customer service organization
by
Inghilleri, Leonardo
,
Solomon, Micah
Published 2010
AMACOM American Management Association
Table of Contents:
“
.... -- Recovery! Turning service failures around -- Keeping track to bring them
back
:
tracking
customer roles...
”
Call Number:
HF5415.5
Read Now
11
Agriculture and Trade Liberalisation : Extending the Uruguay Round Agreement
Published 2002
OECD Publishing
“
... prevent
back
-
tracking
. Export credits used by certain countries are also found to distort trade, although...
”
Read Now
12
The best damn cybercrime and digital forensics book period
by
Cardwell, Kevin
Published 2007
Syngres
Table of Contents:
“
... disovery and analysis using
BackTrack
-- Ch. 12. Windows, Linux, and Macintosh boot processes -- Ch. 13...
”
Call Number:
HV6773
Read Now
13
Leveraging Applications of Formal Methods, Verification and Validation. Verification : 8th International Symposium, ISoLA 2018, Limassol, Cyprus, November 5-9, 2018, Proceedings, P...
Published 2018
Springer International Publishing
Table of Contents:
“
...A Broader View on Verification: From Static to Runtime and
Back
(
Track
Summary) -- Monitoring...
”
Read Now
14
Computational Methods for Flow and Transport in Porous Media
Published 2000
Springer Netherlands
Table of Contents:
“
... inheterogeneous media -- Application of the
back
-
tracking
method to the definition of sanitary zones of catchwork...
”
Read Now
15
C# data structures and algorithms : harness the power of C# to build a diverse range of efficient applications
by
Jamro, Marcin
Published 2024
Packt Publishing
Table of Contents:
“
... algorithms -- Divide and conquer algorithms --
Back
-
tracking
algorithms -- Greedy algorithms -- Heuristic...
”
Call Number:
QA76.73.C154
Read Now
16
Metasploit Penetration Testing Cookbook
by
Singh, Abhinav
Published 2012
Packt Publishing
Table of Contents:
“
... with
BackTrack
5 the ultimate combination; Getting ready; How to do it ... ; How it works ... ; Setting up...
”
Call Number:
QA76.9.A25 .S384 2012
Read Now
17
Bioinformatics and Biomedical Engineering : Third International Conference, IWBBIO 2015, Granada, Spain, April 15-17, 2015. Proceedings, Part II
Published 2015
Springer International Publishing
Table of Contents:
“
..., and
back
-
tracking
-- Measurement in biological systems from the self - organisation point of View -- FRAP...
”
Read Now
18
Metasploit : Das Handbuch zum Penetration-Testing-Framework
by
Messner, Michael
Published 2012
dpunkt.verlag
Table of Contents:
“
... Installation und Update; 2.3.1
BackTrack
Linux...
”
Call Number:
QA76.9.A25 .M384 2012
Read Now
19
Anti-hacker tool kit
by
Shema, Mike
Published 2014
McGraw-Hill Education
Table of Contents:
“
...-Line Environments -- Unix Command Line -- Pipes and Redirection -- Command Cornucopia --
BackTrack
...
”
Call Number:
TK5105.59
Read Now
20
Web Penetration Testing with Kali Linux : a Practical Guide to Implementing Penetration Testing Strategies on Websites, Web Applications, and Standard Web Protocols with Kali Linux
by
Muniz, Joseph
Published 2013
Packt Publishing
“
...
BackTrack
that will be used by the reader. It contains clear step-by-step instructions with lot...
”
Call Number:
TK5105.59
1
2
Back
Narrow Search
Year of Publication
From:
To:
Classification
005 - Computer programming, programs & data
13
331 - Labor economics
11
500 - Natural sciences & mathematics
3
364 - Criminology
2
384 - Communications; telecommunication
2
570 - Life sciences; biology
2
more ...
620 - Engineering & allied operations
2
006 - Special computer methods
1
302 - Social interaction
1
330 - Economics
1
352 - General considerations of public administration
1
363 - Other social problems & services
1
380 - Commerce, communications & transportation
1
624 - Civil engineering
1
630 - Agriculture & related technologies
1
658 - General management
1
745 - Decorative arts
1
see all ...
less ...
Language
English
21
German
1
Collection
O'Reilly
16
Springer eBooks 2005-
3
Henry Stewart Talks
1
OECD Books and Papers
1
Springer Book Archives -2004
1
Author
Negus, Chris
2
Ali, Shakeel
1
Ansari, Juned Ahmed
1
Babu, M. Madan
1
Byron, Tim
1
Cardwell, Kevin
1
more ...
Crolet, J.M.
1
Cross, Michael
1
Haines, Brad
1
Harris, Shon
1
Heriyanto, Tedi
1
Inghilleri, Leonardo
1
Jamro, Marcin
1
Lakhani, Aamir
1
Margaria, Tiziana
1
Messner, Michael
1
Mowbray, Thomas J.
1
Muniz, Joseph
1
Organisation for Economic Co-operation and Development
1
Ortuño, Francisco
1
O’Regan, Jadey
1
Perciaccante, Bob
1
Rojas, Ignacio
1
Schearer, Michael J.
1
Schultz, Corey P.
1
Shema, Mike
1
Shimonski, Robert
1
Singh, Abhinav
1
Solomon, Micah
1
Steffen, Bernhard
1
Thornton, Frank
1
see all ...
less ...
Search Tools
Get RSS Feed
Share Search
https://ebooks.mpdl.mpg.de/ebooks/Search/Results?lookfor=%22back+tracking%22&type=AllFields
Send by Email
×
Loading...