Metasploit Penetration Testing Cookbook: Over 80 Recipes to Master the Most Widely Used Penetration Testing Framework
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK
Packt Publishing
2013
|
Ausgabe: | Second edition |
Schlagworte: | |
Beschreibung: | Includes index Print version record |
Beschreibung: | 1 online resource (iv, 306 pages) illustrations |
ISBN: | 9781461949329 1461949327 9781782166795 1782166793 9781782166788 1782166785 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045350330 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2013 |||| o||u| ||||||eng d | ||
020 | |a 9781461949329 |9 978-1-4619-4932-9 | ||
020 | |a 1461949327 |9 1-4619-4932-7 | ||
020 | |a 9781782166795 |9 978-1-78216-679-5 | ||
020 | |a 1782166793 |9 1-78216-679-3 | ||
020 | |a 9781782166788 |9 978-1-78216-678-8 | ||
020 | |a 1782166785 |9 1-78216-678-5 | ||
035 | |a (ZDB-4-ITC)ocn862049144 | ||
035 | |a (OCoLC)862049144 | ||
035 | |a (DE-599)BVBBV045350330 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 22 | |
100 | 1 | |a Agarwal, Monika |e Verfasser |4 aut | |
245 | 1 | 0 | |a Metasploit Penetration Testing Cookbook |b Over 80 Recipes to Master the Most Widely Used Penetration Testing Framework |c Monika Agarwal, Abhinav Singh |
250 | |a Second edition | ||
264 | 1 | |a Birmingham, UK |b Packt Publishing |c 2013 | |
300 | |a 1 online resource (iv, 306 pages) |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
500 | |a Print version record | ||
505 | 8 | |a This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick. This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language | |
630 | 0 | 4 | |a Metasploit (Electronic resource) |
650 | 7 | |a Metasploit (Electronic resource) |2 fast | |
650 | 7 | |a COMPUTERS / Internet / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Networking / Security |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computers / Access control |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
650 | 4 | |a Computers |x Access control |a Penetration testing (Computer security) |a Computer networks |x Security measures |x Testing | |
700 | 1 | |a Singh, Abhinav |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Agarwal, Monika |t Metasploit Penetration Testing Cookbook |d Birmingham : Packt Publishing, 2013 |z 9781782166788 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030736983 |
Datensatz im Suchindex
_version_ | 1804179174902988800 |
---|---|
any_adam_object | |
author | Agarwal, Monika |
author_facet | Agarwal, Monika |
author_role | aut |
author_sort | Agarwal, Monika |
author_variant | m a ma |
building | Verbundindex |
bvnumber | BV045350330 |
collection | ZDB-4-ITC |
contents | This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick. This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language |
ctrlnum | (ZDB-4-ITC)ocn862049144 (OCoLC)862049144 (DE-599)BVBBV045350330 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02512nmm a2200505zc 4500</leader><controlfield tag="001">BV045350330</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2013 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781461949329</subfield><subfield code="9">978-1-4619-4932-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1461949327</subfield><subfield code="9">1-4619-4932-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782166795</subfield><subfield code="9">978-1-78216-679-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782166793</subfield><subfield code="9">1-78216-679-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781782166788</subfield><subfield code="9">978-1-78216-678-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1782166785</subfield><subfield code="9">1-78216-678-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn862049144</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)862049144</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045350330</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Agarwal, Monika</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Metasploit Penetration Testing Cookbook</subfield><subfield code="b">Over 80 Recipes to Master the Most Widely Used Penetration Testing Framework</subfield><subfield code="c">Monika Agarwal, Abhinav Singh</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2013</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (iv, 306 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick. This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Metasploit (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Metasploit (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Internet / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Networking / Security</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Singh, Abhinav</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Agarwal, Monika</subfield><subfield code="t">Metasploit Penetration Testing Cookbook</subfield><subfield code="d">Birmingham : Packt Publishing, 2013</subfield><subfield code="z">9781782166788</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030736983</subfield></datafield></record></collection> |
id | DE-604.BV045350330 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:41Z |
institution | BVB |
isbn | 9781461949329 1461949327 9781782166795 1782166793 9781782166788 1782166785 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030736983 |
oclc_num | 862049144 |
open_access_boolean | |
physical | 1 online resource (iv, 306 pages) illustrations |
psigel | ZDB-4-ITC |
publishDate | 2013 |
publishDateSearch | 2013 |
publishDateSort | 2013 |
publisher | Packt Publishing |
record_format | marc |
spelling | Agarwal, Monika Verfasser aut Metasploit Penetration Testing Cookbook Over 80 Recipes to Master the Most Widely Used Penetration Testing Framework Monika Agarwal, Abhinav Singh Second edition Birmingham, UK Packt Publishing 2013 1 online resource (iv, 306 pages) illustrations txt rdacontent c rdamedia cr rdacarrier Includes index Print version record This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick. This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language Metasploit (Electronic resource) Metasploit (Electronic resource) fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Computers Access control Penetration testing (Computer security) Computer networks Security measures Testing Singh, Abhinav Sonstige oth Erscheint auch als Druck-Ausgabe Agarwal, Monika Metasploit Penetration Testing Cookbook Birmingham : Packt Publishing, 2013 9781782166788 |
spellingShingle | Agarwal, Monika Metasploit Penetration Testing Cookbook Over 80 Recipes to Master the Most Widely Used Penetration Testing Framework This book follows a Cookbook style with recipes explaining the steps for penetration testing with WLAN, VOIP, and even cloud computing. There is plenty of code and commands used to make your learning curve easy and quick. This book targets both professional penetration testers as well as new users of Metasploit, who wish to gain expertise over the framework and learn an additional skill of penetration testing, not limited to a particular OS. The book requires basic knowledge of scanning, exploitation, and the Ruby language Metasploit (Electronic resource) Metasploit (Electronic resource) fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Computers Access control Penetration testing (Computer security) Computer networks Security measures Testing |
title | Metasploit Penetration Testing Cookbook Over 80 Recipes to Master the Most Widely Used Penetration Testing Framework |
title_auth | Metasploit Penetration Testing Cookbook Over 80 Recipes to Master the Most Widely Used Penetration Testing Framework |
title_exact_search | Metasploit Penetration Testing Cookbook Over 80 Recipes to Master the Most Widely Used Penetration Testing Framework |
title_full | Metasploit Penetration Testing Cookbook Over 80 Recipes to Master the Most Widely Used Penetration Testing Framework Monika Agarwal, Abhinav Singh |
title_fullStr | Metasploit Penetration Testing Cookbook Over 80 Recipes to Master the Most Widely Used Penetration Testing Framework Monika Agarwal, Abhinav Singh |
title_full_unstemmed | Metasploit Penetration Testing Cookbook Over 80 Recipes to Master the Most Widely Used Penetration Testing Framework Monika Agarwal, Abhinav Singh |
title_short | Metasploit Penetration Testing Cookbook |
title_sort | metasploit penetration testing cookbook over 80 recipes to master the most widely used penetration testing framework |
title_sub | Over 80 Recipes to Master the Most Widely Used Penetration Testing Framework |
topic | Metasploit (Electronic resource) Metasploit (Electronic resource) fast COMPUTERS / Internet / Security bisacsh COMPUTERS / Networking / Security bisacsh COMPUTERS / Security / General bisacsh Computers / Access control fast Penetration testing (Computer security) fast Computers Access control Penetration testing (Computer security) Computer networks Security measures Testing |
topic_facet | Metasploit (Electronic resource) COMPUTERS / Internet / Security COMPUTERS / Networking / Security COMPUTERS / Security / General Computers / Access control Penetration testing (Computer security) Computers Access control Penetration testing (Computer security) Computer networks Security measures Testing |
work_keys_str_mv | AT agarwalmonika metasploitpenetrationtestingcookbookover80recipestomasterthemostwidelyusedpenetrationtestingframework AT singhabhinav metasploitpenetrationtestingcookbookover80recipestomasterthemostwidelyusedpenetrationtestingframework |