Building virtual pentesting labs for advanced penetration testing: build intricate virtual architecture to practice any penetration testing technique virtually
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2014
|
Schriftenreihe: | Community experience distilled
|
Schlagworte: | |
Beschreibung: | Print version record. - Missing function-level access control |
Beschreibung: | 1 online resource (430 pages) |
ISBN: | 9781783284788 1783284781 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV045350765 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 181210s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781783284788 |9 978-1-78328-478-8 | ||
020 | |a 1783284781 |9 1-78328-478-1 | ||
035 | |a (ZDB-4-ITC)ocn881886712 | ||
035 | |a (OCoLC)881886712 | ||
035 | |a (DE-599)BVBBV045350765 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Cardwell, Kevin |e Verfasser |4 aut | |
245 | 1 | 0 | |a Building virtual pentesting labs for advanced penetration testing |b build intricate virtual architecture to practice any penetration testing technique virtually |c Kevin Cardwell |
264 | 1 | |a Birmingham |b Packt Publishing |c 2014 | |
300 | |a 1 online resource (430 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a Community experience distilled | |
500 | |a Print version record. - Missing function-level access control | ||
505 | 8 | |a Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include firewalls, IDS/IPS, web application firewalls, and endpoint protection, which is essential in the penetration testing world. If you are a penetration tester, security consultant, security test engineer, or analyst who wants to practice and perfect penetration testing skills by building virtual pen testing labs in varying industry scenarios, this is the book for you. This book is ideal if yo | |
650 | 7 | |a COMPUTERS / Security / General |2 bisacsh | |
650 | 7 | |a Computer networks / Security measures |2 fast | |
650 | 7 | |a Computers / Access control |2 fast | |
650 | 4 | |a Computer security |x Testing |a Computer networks |x Security measures |a Computers |x Access control | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Cardwell, Kevin |t Building Virtual Pentesting Labs for Advanced Penetration Testing |d Birmingham : Packt Publishing, 2014 |z 9781783284771 |
912 | |a ZDB-4-ITC | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030737419 |
Datensatz im Suchindex
_version_ | 1804179175657963520 |
---|---|
any_adam_object | |
author | Cardwell, Kevin |
author_facet | Cardwell, Kevin |
author_role | aut |
author_sort | Cardwell, Kevin |
author_variant | k c kc |
building | Verbundindex |
bvnumber | BV045350765 |
collection | ZDB-4-ITC |
contents | Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include firewalls, IDS/IPS, web application firewalls, and endpoint protection, which is essential in the penetration testing world. If you are a penetration tester, security consultant, security test engineer, or analyst who wants to practice and perfect penetration testing skills by building virtual pen testing labs in varying industry scenarios, this is the book for you. This book is ideal if yo |
ctrlnum | (ZDB-4-ITC)ocn881886712 (OCoLC)881886712 (DE-599)BVBBV045350765 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02164nmm a2200385zc 4500</leader><controlfield tag="001">BV045350765</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">181210s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783284788</subfield><subfield code="9">978-1-78328-478-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1783284781</subfield><subfield code="9">1-78328-478-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-ITC)ocn881886712</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)881886712</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045350765</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Cardwell, Kevin</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Building virtual pentesting labs for advanced penetration testing</subfield><subfield code="b">build intricate virtual architecture to practice any penetration testing technique virtually</subfield><subfield code="c">Kevin Cardwell</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (430 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Print version record. - Missing function-level access control</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include firewalls, IDS/IPS, web application firewalls, and endpoint protection, which is essential in the penetration testing world. If you are a penetration tester, security consultant, security test engineer, or analyst who wants to practice and perfect penetration testing skills by building virtual pen testing labs in varying industry scenarios, this is the book for you. This book is ideal if yo</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Security / General</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks / Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers / Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="x">Testing</subfield><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Cardwell, Kevin</subfield><subfield code="t">Building Virtual Pentesting Labs for Advanced Penetration Testing</subfield><subfield code="d">Birmingham : Packt Publishing, 2014</subfield><subfield code="z">9781783284771</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-ITC</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030737419</subfield></datafield></record></collection> |
id | DE-604.BV045350765 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:15:41Z |
institution | BVB |
isbn | 9781783284788 1783284781 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030737419 |
oclc_num | 881886712 |
open_access_boolean | |
physical | 1 online resource (430 pages) |
psigel | ZDB-4-ITC |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Publishing |
record_format | marc |
series2 | Community experience distilled |
spelling | Cardwell, Kevin Verfasser aut Building virtual pentesting labs for advanced penetration testing build intricate virtual architecture to practice any penetration testing technique virtually Kevin Cardwell Birmingham Packt Publishing 2014 1 online resource (430 pages) txt rdacontent c rdamedia cr rdacarrier Community experience distilled Print version record. - Missing function-level access control Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include firewalls, IDS/IPS, web application firewalls, and endpoint protection, which is essential in the penetration testing world. If you are a penetration tester, security consultant, security test engineer, or analyst who wants to practice and perfect penetration testing skills by building virtual pen testing labs in varying industry scenarios, this is the book for you. This book is ideal if yo COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computers / Access control fast Computer security Testing Computer networks Security measures Computers Access control Erscheint auch als Druck-Ausgabe Cardwell, Kevin Building Virtual Pentesting Labs for Advanced Penetration Testing Birmingham : Packt Publishing, 2014 9781783284771 |
spellingShingle | Cardwell, Kevin Building virtual pentesting labs for advanced penetration testing build intricate virtual architecture to practice any penetration testing technique virtually Written in an easy-to-follow approach using hands-on examples, this book helps you create virtual environments for advanced penetration testing, enabling you to build a multi-layered architecture to include firewalls, IDS/IPS, web application firewalls, and endpoint protection, which is essential in the penetration testing world. If you are a penetration tester, security consultant, security test engineer, or analyst who wants to practice and perfect penetration testing skills by building virtual pen testing labs in varying industry scenarios, this is the book for you. This book is ideal if yo COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computers / Access control fast Computer security Testing Computer networks Security measures Computers Access control |
title | Building virtual pentesting labs for advanced penetration testing build intricate virtual architecture to practice any penetration testing technique virtually |
title_auth | Building virtual pentesting labs for advanced penetration testing build intricate virtual architecture to practice any penetration testing technique virtually |
title_exact_search | Building virtual pentesting labs for advanced penetration testing build intricate virtual architecture to practice any penetration testing technique virtually |
title_full | Building virtual pentesting labs for advanced penetration testing build intricate virtual architecture to practice any penetration testing technique virtually Kevin Cardwell |
title_fullStr | Building virtual pentesting labs for advanced penetration testing build intricate virtual architecture to practice any penetration testing technique virtually Kevin Cardwell |
title_full_unstemmed | Building virtual pentesting labs for advanced penetration testing build intricate virtual architecture to practice any penetration testing technique virtually Kevin Cardwell |
title_short | Building virtual pentesting labs for advanced penetration testing |
title_sort | building virtual pentesting labs for advanced penetration testing build intricate virtual architecture to practice any penetration testing technique virtually |
title_sub | build intricate virtual architecture to practice any penetration testing technique virtually |
topic | COMPUTERS / Security / General bisacsh Computer networks / Security measures fast Computers / Access control fast Computer security Testing Computer networks Security measures Computers Access control |
topic_facet | COMPUTERS / Security / General Computer networks / Security measures Computers / Access control Computer security Testing Computer networks Security measures Computers Access control |
work_keys_str_mv | AT cardwellkevin buildingvirtualpentestinglabsforadvancedpenetrationtestingbuildintricatevirtualarchitecturetopracticeanypenetrationtestingtechniquevirtually |