Learning metasploit exploitation and development:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2013
|
Schriftenreihe: | Community experience distilled
|
Schlagworte: | |
Beschreibung: | Online resource; title from PDF title page (EBSCO, viewed July 7, 2017) |
Beschreibung: | 1 online resource illustrations |
ISBN: | 9781782163596 178216359X 1782163581 9781782163589 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045350224 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2013 |||| o||u| ||||||eng d | ||
015 | |a GBB747078 |2 dnb | ||
020 | |a 9781782163596 |9 978-1-78216-359-6 | ||
020 | |a 178216359X |9 1-78216-359-X | ||
020 | |a 1782163581 |9 1-78216-358-1 | ||
020 | |a 9781782163589 |9 978-1-78216-358-9 | ||
035 | |a (ZDB-4-ITC)ocn857061856 | ||
035 | |a (OCoLC)857061856 | ||
035 | |a (DE-599)BVBBV045350224 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Balapure, Aditya |e Verfasser |4 aut | |
245 | 1 | 0 | |a Learning metasploit exploitation and development |c Aditya Balapure |
264 | 1 | |a Birmingham |b Packt Publishing |c 2013 | |
300 | |a 1 online resource |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a Online resource; title from PDF title page (EBSCO, viewed July 7, 2017) | ||
505 | 8 | |a A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level. Prior experience exploiting basic st | |
630 | 0 | 4 | |a Metasploit (Electronic resource) |
650 | 7 | |a Metasploit (Electronic resource) |2 blmlsh | |
650 | 7 | |a Metasploit (Electronic resource) |2 fast | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computers / Access control |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
650 | 4 | |a Computer networks / Security measures / Testing | |
650 | 4 | |a Metasploit (Electronic resource) | |
650 | 4 | |a Computers / Access control | |
650 | 4 | |a Penetration testing (Computer security) | |
650 | 4 | |a Computers / Access control | |
650 | 4 | |a Computers |x Access control |a Penetration testing (Computer security) | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Balapure, Aditya |t Learning Metasploit Exploitation and Development |d Birmingham : Packt Publishing, 2013 |z 9781782163589 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736877 |
Datensatz im Suchindex
_version_ | 1804179174731022336 |
---|---|
any_adam_object | |
author | Balapure, Aditya |
author_facet | Balapure, Aditya |
author_role | aut |
author_sort | Balapure, Aditya |
author_variant | a b ab |
building | Verbundindex |
bvnumber | BV045350224 |
collection | ZDB-4-ITC |
contents | A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level. Prior experience exploiting basic st |
ctrlnum | (ZDB-4-ITC)ocn857061856 (OCoLC)857061856 (DE-599)BVBBV045350224 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02573nmm a2200517zc 4500</leader><controlfield tag="001">BV045350224</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB747078</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782163596</subfield><subfield code="9">978-1-78216-359-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">178216359X</subfield><subfield code="9">1-78216-359-X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782163581</subfield><subfield code="9">1-78216-358-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782163589</subfield><subfield code="9">978-1-78216-358-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn857061856</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)857061856</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045350224</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Balapure, Aditya</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learning metasploit exploitation and development</subfield><subfield code="c">Aditya Balapure</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from PDF title page (EBSCO, viewed July 7, 2017)</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level. Prior experience exploiting basic st</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Metasploit (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Metasploit (Electronic resource)</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Metasploit (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures / Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Metasploit (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers / Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Balapure, Aditya</subfield><subfield code="t">Learning Metasploit Exploitation and Development</subfield><subfield code="d">Birmingham : Packt Publishing, 2013</subfield><subfield code="z">9781782163589</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736877</subfield></datafield></record></collection> |
id | DE-604.BV045350224 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:41Z |
institution | BVB |
isbn | 9781782163596 178216359X 1782163581 9781782163589 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736877 |
oclc_num | 857061856 |
open_access_boolean | |
physical | 1 online resource illustrations |
psigel | ZDB-4-ITC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Packt Publishing |
record_format | marc |
series2 | Community experience distilled |
spelling | Balapure, Aditya Verfasser aut Learning metasploit exploitation and development Aditya Balapure Birmingham Packt Publishing 2013 1 online resource illustrations txt rdacontent c rdamedia cr rdacarrier Community experience distilled Online resource; title from PDF title page (EBSCO, viewed July 7, 2017) A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level. Prior experience exploiting basic st Metasploit (Electronic resource) Metasploit (Electronic resource) blmlsh Metasploit (Electronic resource) fast COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Computer networks / Security measures / Testing Computers / Access control Penetration testing (Computer security) Computers Access control Penetration testing (Computer security) Erscheint auch als Druck-Ausgabe Balapure, Aditya Learning Metasploit Exploitation and Development Birmingham : Packt Publishing, 2013 9781782163589 |
spellingShingle | Balapure, Aditya Learning metasploit exploitation and development A practical, hands-on tutorial with step-by-step instructions. The book will follow a smooth and easy-to-follow tutorial approach, covering the essentials and then showing the readers how to write more sophisticated exploits. This book targets exploit developers, vulnerability analysts and researchers, network administrators, and ethical hackers looking to gain advanced knowledge in exploitation development and identifying vulnerabilities. The primary goal is to take readers wishing to get into more advanced exploitation discovery and reaching the next level. Prior experience exploiting basic st Metasploit (Electronic resource) Metasploit (Electronic resource) blmlsh Metasploit (Electronic resource) fast COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Computer networks / Security measures / Testing Computers / Access control Penetration testing (Computer security) Computers Access control Penetration testing (Computer security) |
title | Learning metasploit exploitation and development |
title_auth | Learning metasploit exploitation and development |
title_exact_search | Learning metasploit exploitation and development |
title_full | Learning metasploit exploitation and development Aditya Balapure |
title_fullStr | Learning metasploit exploitation and development Aditya Balapure |
title_full_unstemmed | Learning metasploit exploitation and development Aditya Balapure |
title_short | Learning metasploit exploitation and development |
title_sort | learning metasploit exploitation and development |
topic | Metasploit (Electronic resource) Metasploit (Electronic resource) blmlsh Metasploit (Electronic resource) fast COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Computer networks / Security measures / Testing Computers / Access control Penetration testing (Computer security) Computers Access control Penetration testing (Computer security) |
topic_facet | Metasploit (Electronic resource) COMPUTERS / Security / General Computers / Access control Penetration testing (Computer security) Computer networks / Security measures / Testing Computers Access control Penetration testing (Computer security) |
work_keys_str_mv | AT balapureaditya learningmetasploitexploitationanddevelopment |