Kali Linux: Assuring Security By Penetration Testing
Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux tes...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Olton Birmingham
Packt Publishing
2014
|
Schlagworte: | |
Zusammenfassung: | Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually.If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (526 pages) |
ISBN: | 9781849519496 9781849519489 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043606909 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781849519496 |9 978-1-84951-949-6 | ||
020 | |a 9781849519489 |c Print |9 978-1-84951-948-9 | ||
035 | |a (ZDB-30-PQE)EBC1572946 | ||
035 | |a (ZDB-89-EBL)EBL1572946 | ||
035 | |a (ZDB-38-EBR)ebr10859685 | ||
035 | |a (OCoLC)879386170 | ||
035 | |a (DE-599)BVBBV043606909 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Ali, Shakeel |e Verfasser |4 aut | |
245 | 1 | 0 | |a Kali Linux |b Assuring Security By Penetration Testing |
264 | 1 | |a Olton Birmingham |b Packt Publishing |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (526 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually.If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you | ||
650 | 4 | |a Linux | |
650 | 4 | |a Open source software | |
650 | 4 | |a Operating systems (Computers) | |
700 | 1 | |a Heriyanto, Tedi |e Sonstige |4 oth | |
700 | 1 | |a Allen, Lee |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Ali, Shakeel |t Kali Linux : Assuring Security By Penetration Testing |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029020968 |
Datensatz im Suchindex
_version_ | 1804176353903247360 |
---|---|
any_adam_object | |
author | Ali, Shakeel |
author_facet | Ali, Shakeel |
author_role | aut |
author_sort | Ali, Shakeel |
author_variant | s a sa |
building | Verbundindex |
bvnumber | BV043606909 |
collection | ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)EBC1572946 (ZDB-89-EBL)EBL1572946 (ZDB-38-EBR)ebr10859685 (OCoLC)879386170 (DE-599)BVBBV043606909 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01951nmm a2200421zc 4500</leader><controlfield tag="001">BV043606909</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849519496</subfield><subfield code="9">978-1-84951-949-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849519489</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-84951-948-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1572946</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1572946</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10859685</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)879386170</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043606909</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ali, Shakeel</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali Linux</subfield><subfield code="b">Assuring Security By Penetration Testing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Olton Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (526 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually.If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Open source software</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Operating systems (Computers)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Heriyanto, Tedi</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Allen, Lee</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Ali, Shakeel</subfield><subfield code="t">Kali Linux : Assuring Security By Penetration Testing</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029020968</subfield></datafield></record></collection> |
id | DE-604.BV043606909 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:50Z |
institution | BVB |
isbn | 9781849519496 9781849519489 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029020968 |
oclc_num | 879386170 |
open_access_boolean | |
physical | 1 online resource (526 pages) |
psigel | ZDB-30-PQE |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Publishing |
record_format | marc |
spelling | Ali, Shakeel Verfasser aut Kali Linux Assuring Security By Penetration Testing Olton Birmingham Packt Publishing 2014 © 2014 1 online resource (526 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Written as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually.If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you Linux Open source software Operating systems (Computers) Heriyanto, Tedi Sonstige oth Allen, Lee Sonstige oth Erscheint auch als Druck-Ausgabe Ali, Shakeel Kali Linux : Assuring Security By Penetration Testing |
spellingShingle | Ali, Shakeel Kali Linux Assuring Security By Penetration Testing Linux Open source software Operating systems (Computers) |
title | Kali Linux Assuring Security By Penetration Testing |
title_auth | Kali Linux Assuring Security By Penetration Testing |
title_exact_search | Kali Linux Assuring Security By Penetration Testing |
title_full | Kali Linux Assuring Security By Penetration Testing |
title_fullStr | Kali Linux Assuring Security By Penetration Testing |
title_full_unstemmed | Kali Linux Assuring Security By Penetration Testing |
title_short | Kali Linux |
title_sort | kali linux assuring security by penetration testing |
title_sub | Assuring Security By Penetration Testing |
topic | Linux Open source software Operating systems (Computers) |
topic_facet | Linux Open source software Operating systems (Computers) |
work_keys_str_mv | AT alishakeel kalilinuxassuringsecuritybypenetrationtesting AT heriyantotedi kalilinuxassuringsecuritybypenetrationtesting AT allenlee kalilinuxassuringsecuritybypenetrationtesting |