Web Penetration Testing with Kali Linux: a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2013
|
Schlagworte: | |
Online-Zugang: | FAW01 FAW02 |
Beschreibung: | Penetration Testing and Setup -- Reconnaissance -- Server-side Attacks -- Client-side Attacks -- Attacking Authentication -- Web Attacks -- Defensive Countermeasures -- Penetration Test Executive Report Web Penetration Testing with Kali Linux contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user.""Web Penetration Testing with Kali Linux"" is ideal for anyone who is interested in learning how to become a penetration tester. It will also help the users who are new to Kali Linux and want to learn the features and differences in Kali versus Backtrack, and seasoned penetration testers |
ISBN: | 9781782163176 1782163174 1299926266 9781299926264 1782163166 9781782163169 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043777264 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160920s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781782163176 |9 978-1-78216-317-6 | ||
020 | |a 1782163174 |9 1-78216-317-4 | ||
020 | |a 1299926266 |9 1-299-92626-6 | ||
020 | |a 9781299926264 |9 978-1-299-92626-4 | ||
020 | |a 1782163166 |9 1-78216-316-6 | ||
020 | |a 9781782163169 |9 978-1-78216-316-9 | ||
020 | |a 9781782163169 |9 978-1-78216-316-9 | ||
035 | |a (ZDB-4-EBA)ocn859388541 | ||
035 | |a (ZDB-4-ITC)ocn859388541 | ||
035 | |a (OCoLC)859388541 | ||
035 | |a (DE-599)BVBBV043777264 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-1046 |a DE-1047 | ||
082 | 0 | |a 006.74 |2 22 | |
100 | 1 | |a Muniz, Joseph |e Verfasser |4 aut | |
245 | 1 | 0 | |a Web Penetration Testing with Kali Linux |b a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux |c Joseph Muniz, Aamir Lakhani |
264 | 1 | |a Birmingham |b Packt Publishing |c 2013 | |
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Penetration Testing and Setup -- Reconnaissance -- Server-side Attacks -- Client-side Attacks -- Attacking Authentication -- Web Attacks -- Defensive Countermeasures -- Penetration Test Executive Report | ||
500 | |a Web Penetration Testing with Kali Linux contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user.""Web Penetration Testing with Kali Linux"" is ideal for anyone who is interested in learning how to become a penetration tester. It will also help the users who are new to Kali Linux and want to learn the features and differences in Kali versus Backtrack, and seasoned penetration testers | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Computers / Access control | |
650 | 7 | |a COMPUTERS / General |2 bisacsh | |
650 | 4 | |a Computer networks |x Security measures | |
650 | 4 | |a Web sites |x Evaluation | |
650 | 4 | |a Web sites |x Testing | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers |x Access control | |
650 | 0 | 7 | |a Debian GNU/LINUX |0 (DE-588)4543287-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Debian GNU/LINUX |0 (DE-588)4543287-9 |D s |
689 | 0 | 1 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Lakhani, Aamir |e Sonstige |4 oth | |
912 | |a ZDB-4-EBA |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029188324 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=644345 |l FAW01 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext | |
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=644345 |l FAW02 |p ZDB-4-EBA |q FAW_PDA_EBA |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804176604681732096 |
---|---|
any_adam_object | |
author | Muniz, Joseph |
author_facet | Muniz, Joseph |
author_role | aut |
author_sort | Muniz, Joseph |
author_variant | j m jm |
building | Verbundindex |
bvnumber | BV043777264 |
collection | ZDB-4-EBA ZDB-4-ITC |
ctrlnum | (ZDB-4-EBA)ocn859388541 (ZDB-4-ITC)ocn859388541 (OCoLC)859388541 (DE-599)BVBBV043777264 |
dewey-full | 006.74 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.74 |
dewey-search | 006.74 |
dewey-sort | 16.74 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03132nmm a2200589zc 4500</leader><controlfield tag="001">BV043777264</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160920s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782163176</subfield><subfield code="9">978-1-78216-317-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782163174</subfield><subfield code="9">1-78216-317-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1299926266</subfield><subfield code="9">1-299-92626-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781299926264</subfield><subfield code="9">978-1-299-92626-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782163166</subfield><subfield code="9">1-78216-316-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782163169</subfield><subfield code="9">978-1-78216-316-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782163169</subfield><subfield code="9">978-1-78216-316-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-EBA)ocn859388541</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn859388541</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)859388541</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043777264</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1046</subfield><subfield code="a">DE-1047</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.74</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Muniz, Joseph</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Web Penetration Testing with Kali Linux</subfield><subfield code="b">a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux</subfield><subfield code="c">Joseph Muniz, Aamir Lakhani</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2013</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Penetration Testing and Setup -- Reconnaissance -- Server-side Attacks -- Client-side Attacks -- Attacking Authentication -- Web Attacks -- Defensive Countermeasures -- Penetration Test Executive Report</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Web Penetration Testing with Kali Linux contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user.""Web Penetration Testing with Kali Linux"" is ideal for anyone who is interested in learning how to become a penetration tester. It will also help the users who are new to Kali Linux and want to learn the features and differences in Kali versus Backtrack, and seasoned penetration testers</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites</subfield><subfield code="x">Evaluation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Web sites</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Debian GNU/LINUX</subfield><subfield code="0">(DE-588)4543287-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Debian GNU/LINUX</subfield><subfield code="0">(DE-588)4543287-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lakhani, Aamir</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029188324</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=644345</subfield><subfield code="l">FAW01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=644345</subfield><subfield code="l">FAW02</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FAW_PDA_EBA</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV043777264 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:34:50Z |
institution | BVB |
isbn | 9781782163176 1782163174 1299926266 9781299926264 1782163166 9781782163169 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029188324 |
oclc_num | 859388541 |
open_access_boolean | |
owner | DE-1046 DE-1047 |
owner_facet | DE-1046 DE-1047 |
psigel | ZDB-4-EBA ZDB-4-ITC ZDB-4-EBA FAW_PDA_EBA |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Packt Publishing |
record_format | marc |
spelling | Muniz, Joseph Verfasser aut Web Penetration Testing with Kali Linux a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux Joseph Muniz, Aamir Lakhani Birmingham Packt Publishing 2013 txt rdacontent c rdamedia cr rdacarrier Penetration Testing and Setup -- Reconnaissance -- Server-side Attacks -- Client-side Attacks -- Attacking Authentication -- Web Attacks -- Defensive Countermeasures -- Penetration Test Executive Report Web Penetration Testing with Kali Linux contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user.""Web Penetration Testing with Kali Linux"" is ideal for anyone who is interested in learning how to become a penetration tester. It will also help the users who are new to Kali Linux and want to learn the features and differences in Kali versus Backtrack, and seasoned penetration testers Computer security Computers / Access control COMPUTERS / General bisacsh Computer networks Security measures Web sites Evaluation Web sites Testing Computers Access control Debian GNU/LINUX (DE-588)4543287-9 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf Debian GNU/LINUX (DE-588)4543287-9 s Penetrationstest (DE-588)4825817-9 s 1\p DE-604 Lakhani, Aamir Sonstige oth 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Muniz, Joseph Web Penetration Testing with Kali Linux a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux Computer security Computers / Access control COMPUTERS / General bisacsh Computer networks Security measures Web sites Evaluation Web sites Testing Computers Access control Debian GNU/LINUX (DE-588)4543287-9 gnd Penetrationstest (DE-588)4825817-9 gnd |
subject_GND | (DE-588)4543287-9 (DE-588)4825817-9 |
title | Web Penetration Testing with Kali Linux a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux |
title_auth | Web Penetration Testing with Kali Linux a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux |
title_exact_search | Web Penetration Testing with Kali Linux a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux |
title_full | Web Penetration Testing with Kali Linux a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux Joseph Muniz, Aamir Lakhani |
title_fullStr | Web Penetration Testing with Kali Linux a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux Joseph Muniz, Aamir Lakhani |
title_full_unstemmed | Web Penetration Testing with Kali Linux a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux Joseph Muniz, Aamir Lakhani |
title_short | Web Penetration Testing with Kali Linux |
title_sort | web penetration testing with kali linux a practical guide to implementing penetration testing strategies on websites web applications and standard web protocols with kali linux |
title_sub | a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux |
topic | Computer security Computers / Access control COMPUTERS / General bisacsh Computer networks Security measures Web sites Evaluation Web sites Testing Computers Access control Debian GNU/LINUX (DE-588)4543287-9 gnd Penetrationstest (DE-588)4825817-9 gnd |
topic_facet | Computer security Computers / Access control COMPUTERS / General Computer networks Security measures Web sites Evaluation Web sites Testing Computers Access control Debian GNU/LINUX Penetrationstest |
work_keys_str_mv | AT munizjoseph webpenetrationtestingwithkalilinuxapracticalguidetoimplementingpenetrationtestingstrategiesonwebsiteswebapplicationsandstandardwebprotocolswithkalilinux AT lakhaniaamir webpenetrationtestingwithkalilinuxapracticalguidetoimplementingpenetrationtestingstrategiesonwebsiteswebapplicationsandstandardwebprotocolswithkalilinux |