Metasploit penetration testing cookbook: evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt
February 2018
|
Ausgabe: | Third edition |
Schlagworte: | |
Online-Zugang: | FHI01 UBY01 Volltext |
Beschreibung: | Description based on online resource; title from title page (viewed April 2, 2018) |
Beschreibung: | 1 Online-Ressource (xii, 397 Seiten) Illustrationen, Diagramme (teilweise farbig) |
ISBN: | 9781788629713 178862971X |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV045144095 | ||
003 | DE-604 | ||
005 | 20220316 | ||
007 | cr|uuu---uuuuu | ||
008 | 180823s2018 |||| o||u| ||||||eng d | ||
020 | |a 9781788629713 |9 978-1-78862-971-3 | ||
020 | |a 178862971X |9 1-78862-971-X | ||
035 | |a (ZDB-32-STB)on1030304657 | ||
035 | |a (ZDB-221-PCL)9781788629713 | ||
035 | |a (OCoLC)1030304657 | ||
035 | |a (DE-599)BVBBV045144095 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-573 |a DE-706 |a DE-11 | ||
100 | 1 | |a Teixeira, Daniel |d 1982- |e Verfasser |0 (DE-588)132889234 |4 aut | |
245 | 1 | 0 | |a Metasploit penetration testing cookbook |b evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework |c Daniel Teixeira, Abhinav Singh, Monika Agarwal |
250 | |a Third edition | ||
264 | 1 | |a Birmingham ; Mumbai |b Packt |c February 2018 | |
264 | 4 | |c © 2018 | |
300 | |a 1 Online-Ressource (xii, 397 Seiten) |b Illustrationen, Diagramme (teilweise farbig) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on online resource; title from title page (viewed April 2, 2018) | ||
630 | 0 | 4 | |a Metasploit (Electronic resource) |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Computer networks |x Security measures |x Testing | |
650 | 4 | |a Computers |x Access control | |
700 | 1 | |a Agarwal, Monika |4 aut | |
700 | 1 | |a Singh, Abhinav |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-78862-317-9 |
856 | 4 | 0 | |u http://proquest.tech.safaribooksonline.de/9781788623179 |x Aggregator |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-32-STB |a ZDB-5-WPSE |a ZDB-221-PCL | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030533876 | ||
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0000137.html |l FHI01 |p ZDB-221-PCL |x Aggregator |3 Volltext | |
966 | e | |u https://portal.igpublish.com/iglibrary/search/PACKT0000137.html |l UBY01 |p ZDB-221-PCL |q UBY01_ZDB-221-PCL21 |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804178811165605888 |
---|---|
any_adam_object | |
author | Teixeira, Daniel 1982- Agarwal, Monika Singh, Abhinav |
author_GND | (DE-588)132889234 |
author_facet | Teixeira, Daniel 1982- Agarwal, Monika Singh, Abhinav |
author_role | aut aut aut |
author_sort | Teixeira, Daniel 1982- |
author_variant | d t dt m a ma a s as |
building | Verbundindex |
bvnumber | BV045144095 |
collection | ZDB-32-STB ZDB-5-WPSE ZDB-221-PCL |
ctrlnum | (ZDB-32-STB)on1030304657 (ZDB-221-PCL)9781788629713 (OCoLC)1030304657 (DE-599)BVBBV045144095 |
discipline | Informatik |
edition | Third edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02066nmm a2200457 c 4500</leader><controlfield tag="001">BV045144095</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220316 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180823s2018 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788629713</subfield><subfield code="9">978-1-78862-971-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">178862971X</subfield><subfield code="9">1-78862-971-X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-32-STB)on1030304657</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-221-PCL)9781788629713</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1030304657</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045144095</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-573</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Teixeira, Daniel</subfield><subfield code="d">1982-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)132889234</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Metasploit penetration testing cookbook</subfield><subfield code="b">evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework</subfield><subfield code="c">Daniel Teixeira, Abhinav Singh, Monika Agarwal</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt</subfield><subfield code="c">February 2018</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xii, 397 Seiten)</subfield><subfield code="b">Illustrationen, Diagramme (teilweise farbig)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title page (viewed April 2, 2018)</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Metasploit (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agarwal, Monika</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Abhinav</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-78862-317-9</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://proquest.tech.safaribooksonline.de/9781788623179</subfield><subfield code="x">Aggregator</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-32-STB</subfield><subfield code="a">ZDB-5-WPSE</subfield><subfield code="a">ZDB-221-PCL</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030533876</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0000137.html</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://portal.igpublish.com/iglibrary/search/PACKT0000137.html</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-221-PCL</subfield><subfield code="q">UBY01_ZDB-221-PCL21</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045144095 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:09:54Z |
institution | BVB |
isbn | 9781788629713 178862971X |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030533876 |
oclc_num | 1030304657 |
open_access_boolean | |
owner | DE-573 DE-706 DE-11 |
owner_facet | DE-573 DE-706 DE-11 |
physical | 1 Online-Ressource (xii, 397 Seiten) Illustrationen, Diagramme (teilweise farbig) |
psigel | ZDB-32-STB ZDB-5-WPSE ZDB-221-PCL ZDB-221-PCL UBY01_ZDB-221-PCL21 |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Packt |
record_format | marc |
spelling | Teixeira, Daniel 1982- Verfasser (DE-588)132889234 aut Metasploit penetration testing cookbook evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework Daniel Teixeira, Abhinav Singh, Monika Agarwal Third edition Birmingham ; Mumbai Packt February 2018 © 2018 1 Online-Ressource (xii, 397 Seiten) Illustrationen, Diagramme (teilweise farbig) txt rdacontent c rdamedia cr rdacarrier Description based on online resource; title from title page (viewed April 2, 2018) Metasploit (Electronic resource) Penetration testing (Computer security) Computer networks Security measures Testing Computers Access control Agarwal, Monika aut Singh, Abhinav aut Erscheint auch als Druck-Ausgabe 978-1-78862-317-9 http://proquest.tech.safaribooksonline.de/9781788623179 Aggregator URL des Erstveröffentlichers Volltext |
spellingShingle | Teixeira, Daniel 1982- Agarwal, Monika Singh, Abhinav Metasploit penetration testing cookbook evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework Metasploit (Electronic resource) Penetration testing (Computer security) Computer networks Security measures Testing Computers Access control |
title | Metasploit penetration testing cookbook evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework |
title_auth | Metasploit penetration testing cookbook evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework |
title_exact_search | Metasploit penetration testing cookbook evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework |
title_full | Metasploit penetration testing cookbook evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework Daniel Teixeira, Abhinav Singh, Monika Agarwal |
title_fullStr | Metasploit penetration testing cookbook evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework Daniel Teixeira, Abhinav Singh, Monika Agarwal |
title_full_unstemmed | Metasploit penetration testing cookbook evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework Daniel Teixeira, Abhinav Singh, Monika Agarwal |
title_short | Metasploit penetration testing cookbook |
title_sort | metasploit penetration testing cookbook evade antiviruses bypass firewalls and exploit complex environments with the most widely used penetration testing framework |
title_sub | evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework |
topic | Metasploit (Electronic resource) Penetration testing (Computer security) Computer networks Security measures Testing Computers Access control |
topic_facet | Metasploit (Electronic resource) Penetration testing (Computer security) Computer networks Security measures Testing Computers Access control |
url | http://proquest.tech.safaribooksonline.de/9781788623179 |
work_keys_str_mv | AT teixeiradaniel metasploitpenetrationtestingcookbookevadeantivirusesbypassfirewallsandexploitcomplexenvironmentswiththemostwidelyusedpenetrationtestingframework AT agarwalmonika metasploitpenetrationtestingcookbookevadeantivirusesbypassfirewallsandexploitcomplexenvironmentswiththemostwidelyusedpenetrationtestingframework AT singhabhinav metasploitpenetrationtestingcookbookevadeantivirusesbypassfirewallsandexploitcomplexenvironmentswiththemostwidelyusedpenetrationtestingframework |