Penetration Testing with BackBox:
ethical hacking. This practical book outlines the steps needed to perform penetration testing using BackBox. It explains common penetration testing scenarios and gives practical explanations applicable to a real-world setting. This book is written primarily for security experts and system administra...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2014
|
Schlagworte: | |
Zusammenfassung: | ethical hacking. This practical book outlines the steps needed to perform penetration testing using BackBox. It explains common penetration testing scenarios and gives practical explanations applicable to a real-world setting. This book is written primarily for security experts and system administrators who have an intermediate Linux capability. However, because of the simplicity and user-friendly design, it is also suitable for beginners looking to understand the principle steps of penetration testing |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (139 pages) |
ISBN: | 9781783282982 9781783282975 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043607340 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781783282982 |9 978-1-78328-298-2 | ||
020 | |a 9781783282975 |c Print |9 978-1-78328-297-5 | ||
035 | |a (ZDB-30-PQE)EBC1611819 | ||
035 | |a (ZDB-89-EBL)EBL1611819 | ||
035 | |a (ZDB-38-EBR)ebr10839994 | ||
035 | |a (OCoLC)871189824 | ||
035 | |a (DE-599)BVBBV043607340 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Uygur, Stefan Umit |e Verfasser |4 aut | |
245 | 1 | 0 | |a Penetration Testing with BackBox |
264 | 1 | |a Birmingham |b Packt Publishing |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (139 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a ethical hacking. This practical book outlines the steps needed to perform penetration testing using BackBox. It explains common penetration testing scenarios and gives practical explanations applicable to a real-world setting. This book is written primarily for security experts and system administrators who have an intermediate Linux capability. However, because of the simplicity and user-friendly design, it is also suitable for beginners looking to understand the principle steps of penetration testing | ||
650 | 4 | |a Penetration testing (Computer security) | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Uygur, Stefan Umit |t Penetration Testing with BackBox |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029021399 |
Datensatz im Suchindex
_version_ | 1804176354215723008 |
---|---|
any_adam_object | |
author | Uygur, Stefan Umit |
author_facet | Uygur, Stefan Umit |
author_role | aut |
author_sort | Uygur, Stefan Umit |
author_variant | s u u su suu |
building | Verbundindex |
bvnumber | BV043607340 |
collection | ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)EBC1611819 (ZDB-89-EBL)EBL1611819 (ZDB-38-EBR)ebr10839994 (OCoLC)871189824 (DE-599)BVBBV043607340 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01707nmm a2200373zc 4500</leader><controlfield tag="001">BV043607340</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783282982</subfield><subfield code="9">978-1-78328-298-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783282975</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-78328-297-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1611819</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1611819</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10839994</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)871189824</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043607340</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Uygur, Stefan Umit</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Penetration Testing with BackBox</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (139 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">ethical hacking. This practical book outlines the steps needed to perform penetration testing using BackBox. It explains common penetration testing scenarios and gives practical explanations applicable to a real-world setting. This book is written primarily for security experts and system administrators who have an intermediate Linux capability. However, because of the simplicity and user-friendly design, it is also suitable for beginners looking to understand the principle steps of penetration testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Uygur, Stefan Umit</subfield><subfield code="t">Penetration Testing with BackBox</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029021399</subfield></datafield></record></collection> |
id | DE-604.BV043607340 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:51Z |
institution | BVB |
isbn | 9781783282982 9781783282975 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029021399 |
oclc_num | 871189824 |
open_access_boolean | |
physical | 1 online resource (139 pages) |
psigel | ZDB-30-PQE |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Publishing |
record_format | marc |
spelling | Uygur, Stefan Umit Verfasser aut Penetration Testing with BackBox Birmingham Packt Publishing 2014 © 2014 1 online resource (139 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources ethical hacking. This practical book outlines the steps needed to perform penetration testing using BackBox. It explains common penetration testing scenarios and gives practical explanations applicable to a real-world setting. This book is written primarily for security experts and system administrators who have an intermediate Linux capability. However, because of the simplicity and user-friendly design, it is also suitable for beginners looking to understand the principle steps of penetration testing Penetration testing (Computer security) Erscheint auch als Druck-Ausgabe Uygur, Stefan Umit Penetration Testing with BackBox |
spellingShingle | Uygur, Stefan Umit Penetration Testing with BackBox Penetration testing (Computer security) |
title | Penetration Testing with BackBox |
title_auth | Penetration Testing with BackBox |
title_exact_search | Penetration Testing with BackBox |
title_full | Penetration Testing with BackBox |
title_fullStr | Penetration Testing with BackBox |
title_full_unstemmed | Penetration Testing with BackBox |
title_short | Penetration Testing with BackBox |
title_sort | penetration testing with backbox |
topic | Penetration testing (Computer security) |
topic_facet | Penetration testing (Computer security) |
work_keys_str_mv | AT uygurstefanumit penetrationtestingwithbackbox |