Metasploit: the penetration tester's guide
"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Teste...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
San Francisco
No Starch Press
2011
|
Schlagworte: | |
Online-Zugang: | 13 80 Inhaltsverzeichnis |
Zusammenfassung: | "The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks. Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide will teach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"-- "How to identify and exploit security vulnerabilities with Metasploit, the world's most popular penetration testing framework"-- |
Beschreibung: | XXIV, 299 Seiten Illustrationen 24 cm |
ISBN: | 159327288X 9781593272883 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV043690578 | ||
003 | DE-604 | ||
005 | 20170324 | ||
007 | t | ||
008 | 160728s2011 a||| |||| 00||| eng d | ||
010 | |a 2011020166 | ||
020 | |a 159327288X |c : USD 49.95 |9 1-59327-288-X | ||
020 | |a 9781593272883 |c : USD 49.95 |9 978-1-59327-288-3 | ||
035 | |a (OCoLC)837879481 | ||
035 | |a (DE-599)GBV663713013 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-522 |a DE-Aug4 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
084 | |a 54.38 |2 bkl | ||
100 | 1 | |a Kennedy, David |d 1982- |0 (DE-588)101814403X |4 aut | |
245 | 1 | 0 | |a Metasploit |b the penetration tester's guide |c by David Kennedy, Jim O'Gorman, Devon Kearns, and Mati Aharoni |
264 | 1 | |a San Francisco |b No Starch Press |c 2011 | |
300 | |a XXIV, 299 Seiten |b Illustrationen |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
520 | 1 | |a "The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks. Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide will teach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"-- | |
520 | 1 | |a "How to identify and exploit security vulnerabilities with Metasploit, the world's most popular penetration testing framework"-- | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a ComputersxAccess control | |
650 | 4 | |a Computer networksxSecurity measuresxTesting | |
650 | 0 | 7 | |a VM |0 (DE-588)4259076-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computervirus |0 (DE-588)4214774-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Metasploit-Framework |0 (DE-588)7742304-5 |2 gnd |9 rswk-swf |
653 | |a Metasploit (Electronic resource) | ||
689 | 0 | 0 | |a Metasploit-Framework |0 (DE-588)7742304-5 |D s |
689 | 0 | 1 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 0 | 2 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | 3 | |a VM |0 (DE-588)4259076-0 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Metasploit-Framework |0 (DE-588)7742304-5 |D s |
689 | 1 | 1 | |a Softwareschwachstelle |0 (DE-588)4752508-3 |D s |
689 | 1 | 2 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 1 | 3 | |a Computervirus |0 (DE-588)4214774-8 |D s |
689 | 1 | |8 1\p |5 DE-604 | |
700 | 1 | |a O'Gorman, Jim |0 (DE-588)1064016111 |4 aut | |
700 | 1 | |a Kearns, Devon |0 (DE-588)1064016170 |4 aut | |
700 | 1 | |a Aharoni, Mati |4 aut | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy1201/2011020166-b.html |3 13 | |
856 | 4 | |u http://www.loc.gov/catdir/enhancements/fy1201/2011020166-d.html |3 80 | |
856 | 4 | |m DE-601 |q pdf/application |u http://www.gbv.de/dms/bowker/toc/9781593272883.pdf |3 Inhaltsverzeichnis | |
999 | |a oai:aleph.bib-bvb.de:BVB01-029103260 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk |
Datensatz im Suchindex
_version_ | 1804176464682156032 |
---|---|
any_adam_object | |
author | Kennedy, David 1982- O'Gorman, Jim Kearns, Devon Aharoni, Mati |
author_GND | (DE-588)101814403X (DE-588)1064016111 (DE-588)1064016170 |
author_facet | Kennedy, David 1982- O'Gorman, Jim Kearns, Devon Aharoni, Mati |
author_role | aut aut aut aut |
author_sort | Kennedy, David 1982- |
author_variant | d k dk j o jo d k dk m a ma |
building | Verbundindex |
bvnumber | BV043690578 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)837879481 (DE-599)GBV663713013 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04598nam a2200661 c 4500</leader><controlfield tag="001">BV043690578</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20170324 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">160728s2011 a||| |||| 00||| eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a">2011020166</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">159327288X</subfield><subfield code="c">: USD 49.95</subfield><subfield code="9">1-59327-288-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781593272883</subfield><subfield code="c">: USD 49.95</subfield><subfield code="9">978-1-59327-288-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)837879481</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)GBV663713013</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-522</subfield><subfield code="a">DE-Aug4</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">54.38</subfield><subfield code="2">bkl</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kennedy, David</subfield><subfield code="d">1982-</subfield><subfield code="0">(DE-588)101814403X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Metasploit</subfield><subfield code="b">the penetration tester's guide</subfield><subfield code="c">by David Kennedy, Jim O'Gorman, Devon Kearns, and Mati Aharoni</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XXIV, 299 Seiten</subfield><subfield code="b">Illustrationen</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks. Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide will teach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"--</subfield></datafield><datafield tag="520" ind1="1" ind2=" "><subfield code="a">"How to identify and exploit security vulnerabilities with Metasploit, the world's most popular penetration testing framework"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">ComputersxAccess control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networksxSecurity measuresxTesting</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">VM</subfield><subfield code="0">(DE-588)4259076-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Metasploit (Electronic resource)</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">VM</subfield><subfield code="0">(DE-588)4259076-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Metasploit-Framework</subfield><subfield code="0">(DE-588)7742304-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Softwareschwachstelle</subfield><subfield code="0">(DE-588)4752508-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="2"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="3"><subfield code="a">Computervirus</subfield><subfield code="0">(DE-588)4214774-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">O'Gorman, Jim</subfield><subfield code="0">(DE-588)1064016111</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kearns, Devon</subfield><subfield code="0">(DE-588)1064016170</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aharoni, Mati</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy1201/2011020166-b.html</subfield><subfield code="3">13</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://www.loc.gov/catdir/enhancements/fy1201/2011020166-d.html</subfield><subfield code="3">80</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="m">DE-601</subfield><subfield code="q">pdf/application</subfield><subfield code="u">http://www.gbv.de/dms/bowker/toc/9781593272883.pdf</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029103260</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield></record></collection> |
id | DE-604.BV043690578 |
illustrated | Illustrated |
indexdate | 2024-07-10T07:32:36Z |
institution | BVB |
isbn | 159327288X 9781593272883 |
language | English |
lccn | 2011020166 |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029103260 |
oclc_num | 837879481 |
open_access_boolean | |
owner | DE-522 DE-Aug4 |
owner_facet | DE-522 DE-Aug4 |
physical | XXIV, 299 Seiten Illustrationen 24 cm |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | No Starch Press |
record_format | marc |
spelling | Kennedy, David 1982- (DE-588)101814403X aut Metasploit the penetration tester's guide by David Kennedy, Jim O'Gorman, Devon Kearns, and Mati Aharoni San Francisco No Starch Press 2011 XXIV, 299 Seiten Illustrationen 24 cm txt rdacontent n rdamedia nc rdacarrier "The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks. Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide will teach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"-- "How to identify and exploit security vulnerabilities with Metasploit, the world's most popular penetration testing framework"-- Penetration testing (Computer security) ComputersxAccess control Computer networksxSecurity measuresxTesting VM (DE-588)4259076-0 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf Computervirus (DE-588)4214774-8 gnd rswk-swf Softwareschwachstelle (DE-588)4752508-3 gnd rswk-swf Metasploit-Framework (DE-588)7742304-5 gnd rswk-swf Metasploit (Electronic resource) Metasploit-Framework (DE-588)7742304-5 s Softwareschwachstelle (DE-588)4752508-3 s Penetrationstest (DE-588)4825817-9 s VM (DE-588)4259076-0 s DE-604 Computervirus (DE-588)4214774-8 s 1\p DE-604 O'Gorman, Jim (DE-588)1064016111 aut Kearns, Devon (DE-588)1064016170 aut Aharoni, Mati aut http://www.loc.gov/catdir/enhancements/fy1201/2011020166-b.html 13 http://www.loc.gov/catdir/enhancements/fy1201/2011020166-d.html 80 DE-601 pdf/application http://www.gbv.de/dms/bowker/toc/9781593272883.pdf Inhaltsverzeichnis 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Kennedy, David 1982- O'Gorman, Jim Kearns, Devon Aharoni, Mati Metasploit the penetration tester's guide Penetration testing (Computer security) ComputersxAccess control Computer networksxSecurity measuresxTesting VM (DE-588)4259076-0 gnd Penetrationstest (DE-588)4825817-9 gnd Computervirus (DE-588)4214774-8 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Metasploit-Framework (DE-588)7742304-5 gnd |
subject_GND | (DE-588)4259076-0 (DE-588)4825817-9 (DE-588)4214774-8 (DE-588)4752508-3 (DE-588)7742304-5 |
title | Metasploit the penetration tester's guide |
title_auth | Metasploit the penetration tester's guide |
title_exact_search | Metasploit the penetration tester's guide |
title_full | Metasploit the penetration tester's guide by David Kennedy, Jim O'Gorman, Devon Kearns, and Mati Aharoni |
title_fullStr | Metasploit the penetration tester's guide by David Kennedy, Jim O'Gorman, Devon Kearns, and Mati Aharoni |
title_full_unstemmed | Metasploit the penetration tester's guide by David Kennedy, Jim O'Gorman, Devon Kearns, and Mati Aharoni |
title_short | Metasploit |
title_sort | metasploit the penetration tester s guide |
title_sub | the penetration tester's guide |
topic | Penetration testing (Computer security) ComputersxAccess control Computer networksxSecurity measuresxTesting VM (DE-588)4259076-0 gnd Penetrationstest (DE-588)4825817-9 gnd Computervirus (DE-588)4214774-8 gnd Softwareschwachstelle (DE-588)4752508-3 gnd Metasploit-Framework (DE-588)7742304-5 gnd |
topic_facet | Penetration testing (Computer security) ComputersxAccess control Computer networksxSecurity measuresxTesting VM Penetrationstest Computervirus Softwareschwachstelle Metasploit-Framework |
url | http://www.loc.gov/catdir/enhancements/fy1201/2011020166-b.html http://www.loc.gov/catdir/enhancements/fy1201/2011020166-d.html http://www.gbv.de/dms/bowker/toc/9781593272883.pdf |
work_keys_str_mv | AT kennedydavid metasploitthepenetrationtestersguide AT ogormanjim metasploitthepenetrationtestersguide AT kearnsdevon metasploitthepenetrationtestersguide AT aharonimati metasploitthepenetrationtestersguide |