Penetration testing with the Bash shell: make the most of the Bash shell and Kali Linux's command-line-based security assessment tools
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK
Packt Pub.
2014
|
Schriftenreihe: | Community experience distilled
|
Schlagworte: | |
Beschreibung: | Online resource; title from cover (Safari, viewed May 29, 2014). - Includes index |
Beschreibung: | 1 online resource illustrations |
ISBN: | 9781849695114 1849695113 1849695105 9781849695107 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045350726 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781849695114 |9 978-1-84969-511-4 | ||
020 | |a 1849695113 |9 1-84969-511-3 | ||
020 | |a 1849695105 |9 1-84969-510-5 | ||
020 | |a 9781849695107 |9 978-1-84969-510-7 | ||
035 | |a (ZDB-4-ITC)ocn880852492 | ||
035 | |a (OCoLC)880852492 | ||
035 | |a (DE-599)BVBBV045350726 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Makan, Keith |e Verfasser |4 aut | |
245 | 1 | 0 | |a Penetration testing with the Bash shell |b make the most of the Bash shell and Kali Linux's command-line-based security assessment tools |c Keith Makan |
264 | 1 | |a Birmingham, UK |b Packt Pub. |c 2014 | |
300 | |a 1 online resource |b illustrations | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a Online resource; title from cover (Safari, viewed May 29, 2014). - Includes index | ||
630 | 0 | 4 | |a Kali Linux |a UNIX Shells |
650 | 7 | |a Kali Linux |2 fast | |
650 | 7 | |a UNIX Shells |2 fast | |
650 | 7 | |a COMPUTERS / Security / Online Safety & Privacy |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / Networking |2 bisacsh | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Langages de programmation |2 eclas | |
650 | 7 | |a Programmation informatique |2 eclas | |
650 | 7 | |a Informatique |2 eclas | |
650 | 7 | |a Securite informatique |2 eclas | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
650 | 7 | |a User interfaces (Computer systems) |2 fast | |
650 | 4 | |a Penetration testing (Computer security) |a User interfaces (Computer systems) | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Makan, Keith |t Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools |d Birmingham, England : Packt Publishing Ltd, 2014 |h iii, 130 pages |k Community experience distilled |z 9781849695107 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030737380 |
Datensatz im Suchindex
_version_ | 1804179175603437568 |
---|---|
any_adam_object | |
author | Makan, Keith |
author_facet | Makan, Keith |
author_role | aut |
author_sort | Makan, Keith |
author_variant | k m km |
building | Verbundindex |
bvnumber | BV045350726 |
collection | ZDB-4-ITC |
ctrlnum | (ZDB-4-ITC)ocn880852492 (OCoLC)880852492 (DE-599)BVBBV045350726 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02172nmm a2200505zc 4500</leader><controlfield tag="001">BV045350726</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849695114</subfield><subfield code="9">978-1-84969-511-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849695113</subfield><subfield code="9">1-84969-511-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849695105</subfield><subfield code="9">1-84969-510-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849695107</subfield><subfield code="9">978-1-84969-510-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn880852492</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)880852492</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045350726</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Makan, Keith</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Penetration testing with the Bash shell</subfield><subfield code="b">make the most of the Bash shell and Kali Linux's command-line-based security assessment tools</subfield><subfield code="c">Keith Makan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Pub.</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Online resource; title from cover (Safari, viewed May 29, 2014). - Includes index</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Kali Linux</subfield><subfield code="a">UNIX Shells</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">UNIX Shells</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Online Safety & Privacy</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / Networking</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Langages de programmation</subfield><subfield code="2">eclas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Programmation informatique</subfield><subfield code="2">eclas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Informatique</subfield><subfield code="2">eclas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Securite informatique</subfield><subfield code="2">eclas</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">User interfaces (Computer systems)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="a">User interfaces (Computer systems)</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Makan, Keith</subfield><subfield code="t">Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools</subfield><subfield code="d">Birmingham, England : Packt Publishing Ltd, 2014</subfield><subfield code="h">iii, 130 pages</subfield><subfield code="k">Community experience distilled</subfield><subfield code="z">9781849695107</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030737380</subfield></datafield></record></collection> |
id | DE-604.BV045350726 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:15:41Z |
institution | BVB |
isbn | 9781849695114 1849695113 1849695105 9781849695107 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030737380 |
oclc_num | 880852492 |
open_access_boolean | |
physical | 1 online resource illustrations |
psigel | ZDB-4-ITC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Pub. |
record_format | marc |
series2 | Community experience distilled |
spelling | Makan, Keith Verfasser aut Penetration testing with the Bash shell make the most of the Bash shell and Kali Linux's command-line-based security assessment tools Keith Makan Birmingham, UK Packt Pub. 2014 1 online resource illustrations txt rdacontent c rdamedia cr rdacarrier Community experience distilled Online resource; title from cover (Safari, viewed May 29, 2014). - Includes index Kali Linux UNIX Shells Kali Linux fast UNIX Shells fast COMPUTERS / Security / Online Safety & Privacy bisacsh COMPUTERS / Security / Networking bisacsh COMPUTERS / Security / General bisacsh Langages de programmation eclas Programmation informatique eclas Informatique eclas Securite informatique eclas Penetration testing (Computer security) fast User interfaces (Computer systems) fast Penetration testing (Computer security) User interfaces (Computer systems) Erscheint auch als Druck-Ausgabe Makan, Keith Penetration testing with the Bash shell : make the most of the Bash shell and Kali Linux's command-line-based security assessment tools Birmingham, England : Packt Publishing Ltd, 2014 iii, 130 pages Community experience distilled 9781849695107 |
spellingShingle | Makan, Keith Penetration testing with the Bash shell make the most of the Bash shell and Kali Linux's command-line-based security assessment tools Kali Linux UNIX Shells Kali Linux fast UNIX Shells fast COMPUTERS / Security / Online Safety & Privacy bisacsh COMPUTERS / Security / Networking bisacsh COMPUTERS / Security / General bisacsh Langages de programmation eclas Programmation informatique eclas Informatique eclas Securite informatique eclas Penetration testing (Computer security) fast User interfaces (Computer systems) fast Penetration testing (Computer security) User interfaces (Computer systems) |
title | Penetration testing with the Bash shell make the most of the Bash shell and Kali Linux's command-line-based security assessment tools |
title_auth | Penetration testing with the Bash shell make the most of the Bash shell and Kali Linux's command-line-based security assessment tools |
title_exact_search | Penetration testing with the Bash shell make the most of the Bash shell and Kali Linux's command-line-based security assessment tools |
title_full | Penetration testing with the Bash shell make the most of the Bash shell and Kali Linux's command-line-based security assessment tools Keith Makan |
title_fullStr | Penetration testing with the Bash shell make the most of the Bash shell and Kali Linux's command-line-based security assessment tools Keith Makan |
title_full_unstemmed | Penetration testing with the Bash shell make the most of the Bash shell and Kali Linux's command-line-based security assessment tools Keith Makan |
title_short | Penetration testing with the Bash shell |
title_sort | penetration testing with the bash shell make the most of the bash shell and kali linux s command line based security assessment tools |
title_sub | make the most of the Bash shell and Kali Linux's command-line-based security assessment tools |
topic | Kali Linux UNIX Shells Kali Linux fast UNIX Shells fast COMPUTERS / Security / Online Safety & Privacy bisacsh COMPUTERS / Security / Networking bisacsh COMPUTERS / Security / General bisacsh Langages de programmation eclas Programmation informatique eclas Informatique eclas Securite informatique eclas Penetration testing (Computer security) fast User interfaces (Computer systems) fast Penetration testing (Computer security) User interfaces (Computer systems) |
topic_facet | Kali Linux UNIX Shells Kali Linux UNIX Shells COMPUTERS / Security / Online Safety & Privacy COMPUTERS / Security / Networking COMPUTERS / Security / General Langages de programmation Programmation informatique Informatique Securite informatique Penetration testing (Computer security) User interfaces (Computer systems) Penetration testing (Computer security) User interfaces (Computer systems) |
work_keys_str_mv | AT makankeith penetrationtestingwiththebashshellmakethemostofthebashshellandkalilinuxscommandlinebasedsecurityassessmenttools |