000 | 01867cam a2200349 i 4500 | ||
---|---|---|---|
001 | 18066598 | ||
003 | APU | ||
005 | 20160406141853.0 | ||
008 | 140313t20152015flua b 001 0 eng | ||
010 | _a2014006695 | ||
020 | _a9781482231618 (pbk.) | ||
020 | _a1482231611 (pbk.) | ||
040 |
_aDLC _beng _cDLC _dTY _dNIK |
||
042 | _apcc | ||
050 | 0 | 0 |
_aQA76.9.A25 _bB35 2015 |
082 | 0 | 0 |
_a005.8 _223 |
100 | 1 |
_aBaloch, Rafay. _935641 |
|
245 | 1 | 0 |
_aEthical hacking and penetration testing guide / _cRafay Baloch. |
250 | _a1st ed. | ||
260 |
_aBroken Sound Parkway, N.W. : _bCRC Press, _cc2015. |
||
300 |
_axxvii, 503 p. : _bill. ; _c26 cm |
||
504 | _aIncludes bibliographical references and index. | ||
520 | _a"This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "-- | ||
650 | 0 |
_aPenetration testing (Computer security) _911344 |
|
650 | 7 |
_aCOMPUTERS / Security / General. _2bisacsh _981 |
|
650 | 7 |
_aCOMPUTERS / Networking / General. _2bisacsh _917893 |
|
650 | 7 |
_aLAW / Forensic Science. _2bisacsh _935642 |
|
856 | 4 | 2 |
_3Cover image _uhttp://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg |
906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
942 |
_2lcc _cBook |
||
999 |
_c379693 _d379693 |