Kali Linux CTF Blueprints:
Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customising your own challenges. If you are a penetration testing team lea...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Olton
Packt Publishing
2014
|
Schlagworte: | |
Zusammenfassung: | Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customising your own challenges. If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (208 pages) |
ISBN: | 9781783985999 9781783985982 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043609258 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781783985999 |9 978-1-78398-599-9 | ||
020 | |a 9781783985982 |c Print |9 978-1-78398-598-2 | ||
035 | |a (ZDB-30-PQE)EBC1688607 | ||
035 | |a (ZDB-89-EBL)EBL1688607 | ||
035 | |a (ZDB-38-EBR)ebr10900535 | ||
035 | |a (OCoLC)885020720 | ||
035 | |a (DE-599)BVBBV043609258 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Buchanan, Cameron |e Verfasser |4 aut | |
245 | 1 | 0 | |a Kali Linux CTF Blueprints |
264 | 1 | |a Olton |b Packt Publishing |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (208 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customising your own challenges. If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system | ||
650 | 4 | |a Computer networks -- Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers -- Access control | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Buchanan, Cameron |t Kali Linux CTF Blueprints |
912 | |a ZDB-30-PQE | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029023317 |
Datensatz im Suchindex
_version_ | 1804176355522248704 |
---|---|
any_adam_object | |
author | Buchanan, Cameron |
author_facet | Buchanan, Cameron |
author_role | aut |
author_sort | Buchanan, Cameron |
author_variant | c b cb |
building | Verbundindex |
bvnumber | BV043609258 |
collection | ZDB-30-PQE |
ctrlnum | (ZDB-30-PQE)EBC1688607 (ZDB-89-EBL)EBL1688607 (ZDB-38-EBR)ebr10900535 (OCoLC)885020720 (DE-599)BVBBV043609258 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01810nmm a2200397zc 4500</leader><controlfield tag="001">BV043609258</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783985999</subfield><subfield code="9">978-1-78398-599-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783985982</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-78398-598-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1688607</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1688607</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10900535</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)885020720</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043609258</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Buchanan, Cameron</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali Linux CTF Blueprints</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Olton</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (208 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customising your own challenges. If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks -- Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers -- Access control</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Buchanan, Cameron</subfield><subfield code="t">Kali Linux CTF Blueprints</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029023317</subfield></datafield></record></collection> |
id | DE-604.BV043609258 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:52Z |
institution | BVB |
isbn | 9781783985999 9781783985982 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029023317 |
oclc_num | 885020720 |
open_access_boolean | |
physical | 1 online resource (208 pages) |
psigel | ZDB-30-PQE |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Publishing |
record_format | marc |
spelling | Buchanan, Cameron Verfasser aut Kali Linux CTF Blueprints Olton Packt Publishing 2014 © 2014 1 online resource (208 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources Taking a highly practical approach and a playful tone, Kali Linux CTF Blueprints provides step-by-step guides to setting up vulnerabilities, in-depth guidance to exploiting them, and a variety of advice and ideas to build and customising your own challenges. If you are a penetration testing team leader or individual who wishes to challenge yourself or your friends in the creation of penetration testing assault courses, this is the book for you. The book assumes a basic level of penetration skills and familiarity with the Kali Linux operating system Computer networks -- Security measures Computer security Computers -- Access control Erscheint auch als Druck-Ausgabe Buchanan, Cameron Kali Linux CTF Blueprints |
spellingShingle | Buchanan, Cameron Kali Linux CTF Blueprints Computer networks -- Security measures Computer security Computers -- Access control |
title | Kali Linux CTF Blueprints |
title_auth | Kali Linux CTF Blueprints |
title_exact_search | Kali Linux CTF Blueprints |
title_full | Kali Linux CTF Blueprints |
title_fullStr | Kali Linux CTF Blueprints |
title_full_unstemmed | Kali Linux CTF Blueprints |
title_short | Kali Linux CTF Blueprints |
title_sort | kali linux ctf blueprints |
topic | Computer networks -- Security measures Computer security Computers -- Access control |
topic_facet | Computer networks -- Security measures Computer security Computers -- Access control |
work_keys_str_mv | AT buchanancameron kalilinuxctfblueprints |