Penetration tester's open source toolkit:
Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Ausgabe: | Fourth edition |
Schlagworte: | |
Online-Zugang: | FLA01 URL des Erstveröffentlichers |
Zusammenfassung: | Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need |
Beschreibung: | Includes index |
Beschreibung: | 1 online resource |
ISBN: | 9780128023532 0128023538 0128021497 9780128021491 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045131161 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 180814s2017 |||| o||u| ||||||eng d | ||
020 | |a 9780128023532 |9 978-0-12-802353-2 | ||
020 | |a 0128023538 |9 0-12-802353-8 | ||
020 | |a 0128021497 |9 0-12-802149-7 | ||
020 | |a 9780128021491 |9 978-0-12-802149-1 | ||
035 | |a (ZDB-33-ESD)ocn959276023 | ||
035 | |a (OCoLC)959276023 | ||
035 | |a (DE-599)BVBBV045131161 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Faircloth, Jeremy |e Verfasser |4 aut | |
245 | 1 | 0 | |a Penetration tester's open source toolkit |c Jeremy Faircloth ; Michael Rogers, technical editor |
250 | |a Fourth edition | ||
300 | |a 1 online resource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need | ||
650 | 7 | |a COMPUTERS / Security / Online Safety & Privacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / Networking |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computers / Access control |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Computers |x Access control | |
650 | 4 | |a Computer networks |x Security measures |x Testing | |
650 | 0 | 7 | |a Open Source |0 (DE-588)4548264-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Penetrationstest |0 (DE-588)4825817-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Programm |0 (DE-588)4047394-6 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Open Source |0 (DE-588)4548264-0 |D s |
689 | 0 | 1 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
689 | 1 | 0 | |a Penetrationstest |0 (DE-588)4825817-9 |D s |
689 | 1 | 1 | |a Programm |0 (DE-588)4047394-6 |D s |
689 | 1 | |8 2\p |5 DE-604 | |
856 | 4 | 0 | |u http://www.sciencedirect.com/science/book/9780128021491 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-33-ESD |a ZDB-33-EBS | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030521156 | ||
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
883 | 1 | |8 2\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
966 | e | |u http://www.sciencedirect.com/science/book/9780128021491 |l FLA01 |p ZDB-33-ESD |q FLA_PDA_ESD |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804178790406946816 |
---|---|
any_adam_object | |
author | Faircloth, Jeremy |
author_facet | Faircloth, Jeremy |
author_role | aut |
author_sort | Faircloth, Jeremy |
author_variant | j f jf |
building | Verbundindex |
bvnumber | BV045131161 |
collection | ZDB-33-ESD ZDB-33-EBS |
ctrlnum | (ZDB-33-ESD)ocn959276023 (OCoLC)959276023 (DE-599)BVBBV045131161 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Fourth edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03623nmm a2200589zc 4500</leader><controlfield tag="001">BV045131161</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180814s2017 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128023532</subfield><subfield code="9">978-0-12-802353-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128023538</subfield><subfield code="9">0-12-802353-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128021497</subfield><subfield code="9">0-12-802149-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128021491</subfield><subfield code="9">978-0-12-802149-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-33-ESD)ocn959276023</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)959276023</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045131161</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Faircloth, Jeremy</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Penetration tester's open source toolkit</subfield><subfield code="c">Jeremy Faircloth ; Michael Rogers, technical editor</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Fourth edition</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Online Safety & Privacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Open Source</subfield><subfield code="0">(DE-588)4548264-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Programm</subfield><subfield code="0">(DE-588)4047394-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Open Source</subfield><subfield code="0">(DE-588)4548264-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Programm</subfield><subfield code="0">(DE-588)4047394-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://www.sciencedirect.com/science/book/9780128021491</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-33-ESD</subfield><subfield code="a">ZDB-33-EBS</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030521156</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">2\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://www.sciencedirect.com/science/book/9780128021491</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-33-ESD</subfield><subfield code="q">FLA_PDA_ESD</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045131161 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:09:34Z |
institution | BVB |
isbn | 9780128023532 0128023538 0128021497 9780128021491 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030521156 |
oclc_num | 959276023 |
open_access_boolean | |
physical | 1 online resource |
psigel | ZDB-33-ESD ZDB-33-EBS ZDB-33-ESD FLA_PDA_ESD |
publishDateSearch | 2017 |
publishDateSort | 2017 |
record_format | marc |
spelling | Faircloth, Jeremy Verfasser aut Penetration tester's open source toolkit Jeremy Faircloth ; Michael Rogers, technical editor Fourth edition 1 online resource txt rdacontent c rdamedia cr rdacarrier Includes index Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need COMPUTERS / Security / Online Safety & Privacy bisacsh COMPUTERS / Security / Networking bisacsh COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Penetration testing (Computer security) Computers Access control Computer networks Security measures Testing Open Source (DE-588)4548264-0 gnd rswk-swf Penetrationstest (DE-588)4825817-9 gnd rswk-swf Programm (DE-588)4047394-6 gnd rswk-swf Open Source (DE-588)4548264-0 s Penetrationstest (DE-588)4825817-9 s 1\p DE-604 Programm (DE-588)4047394-6 s 2\p DE-604 http://www.sciencedirect.com/science/book/9780128021491 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk 2\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Faircloth, Jeremy Penetration tester's open source toolkit COMPUTERS / Security / Online Safety & Privacy bisacsh COMPUTERS / Security / Networking bisacsh COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Penetration testing (Computer security) Computers Access control Computer networks Security measures Testing Open Source (DE-588)4548264-0 gnd Penetrationstest (DE-588)4825817-9 gnd Programm (DE-588)4047394-6 gnd |
subject_GND | (DE-588)4548264-0 (DE-588)4825817-9 (DE-588)4047394-6 |
title | Penetration tester's open source toolkit |
title_auth | Penetration tester's open source toolkit |
title_exact_search | Penetration tester's open source toolkit |
title_full | Penetration tester's open source toolkit Jeremy Faircloth ; Michael Rogers, technical editor |
title_fullStr | Penetration tester's open source toolkit Jeremy Faircloth ; Michael Rogers, technical editor |
title_full_unstemmed | Penetration tester's open source toolkit Jeremy Faircloth ; Michael Rogers, technical editor |
title_short | Penetration tester's open source toolkit |
title_sort | penetration tester s open source toolkit |
topic | COMPUTERS / Security / Online Safety & Privacy bisacsh COMPUTERS / Security / Networking bisacsh COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Penetration testing (Computer security) Computers Access control Computer networks Security measures Testing Open Source (DE-588)4548264-0 gnd Penetrationstest (DE-588)4825817-9 gnd Programm (DE-588)4047394-6 gnd |
topic_facet | COMPUTERS / Security / Online Safety & Privacy COMPUTERS / Security / Networking COMPUTERS / Security / General Computers / Access control Penetration testing (Computer security) Computers Access control Computer networks Security measures Testing Open Source Penetrationstest Programm |
url | http://www.sciencedirect.com/science/book/9780128021491 |
work_keys_str_mv | AT fairclothjeremy penetrationtestersopensourcetoolkit |