The the Complete Metasploit Guide: Explore Effective Penetration Testing Techniques with Metasploit
This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perf...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing, Limited
2019
|
Schlagworte: | |
Online-Zugang: | UBY01 |
Zusammenfassung: | This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure .. |
Beschreibung: | Description based on publisher supplied metadata and other sources |
Beschreibung: | 1 online resource (651 pages) |
ISBN: | 9781838826901 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV046684178 | ||
003 | DE-604 | ||
005 | 20211018 | ||
007 | cr|uuu---uuuuu | ||
008 | 200423s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781838826901 |9 978-1-83882-690-1 | ||
035 | |a (ZDB-30-PQE)EBC5802136 | ||
035 | |a (ZDB-89-EBL)EBL5802136 | ||
035 | |a (ZDB-4-NLEBK)2177837 | ||
035 | |a (OCoLC)1108551773 | ||
035 | |a (DE-599)BVBBV046684178 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-706 | ||
082 | 0 | |a 658.478 | |
100 | 1 | |a Rahalkar, Sagar Ajay |e Verfasser |0 (DE-588)1179109120 |4 aut | |
245 | 1 | 0 | |a The the Complete Metasploit Guide |b Explore Effective Penetration Testing Techniques with Metasploit |
264 | 1 | |a Birmingham |b Packt Publishing, Limited |c 2019 | |
264 | 4 | |c © 2019 | |
300 | |a 1 online resource (651 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure .. | ||
650 | 4 | |a Computer security-Management. | |
650 | 4 | |a Metasploit (Electronic resource) | |
650 | 4 | |a Computer networks-Security measures | |
700 | 1 | |a Jaswal, Nipun |e Sonstige |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Rahalkar, Sagar |t The the Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit |d Birmingham : Packt Publishing, Limited,c2019 |z 9781838822477 |
912 | |a ZDB-30-PQE |a ZDB-5-WPSE |a ZDB-4-NLEBK | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-032094962 | ||
966 | e | |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2177837 |l UBY01 |p ZDB-4-NLEBK |q UBY01_DDA21 |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1804181406725701632 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Rahalkar, Sagar Ajay |
author_GND | (DE-588)1179109120 |
author_facet | Rahalkar, Sagar Ajay |
author_role | aut |
author_sort | Rahalkar, Sagar Ajay |
author_variant | s a r sa sar |
building | Verbundindex |
bvnumber | BV046684178 |
collection | ZDB-30-PQE ZDB-5-WPSE ZDB-4-NLEBK |
ctrlnum | (ZDB-30-PQE)EBC5802136 (ZDB-89-EBL)EBL5802136 (ZDB-4-NLEBK)2177837 (OCoLC)1108551773 (DE-599)BVBBV046684178 |
dewey-full | 658.478 |
dewey-hundreds | 600 - Technology (Applied sciences) |
dewey-ones | 658 - General management |
dewey-raw | 658.478 |
dewey-search | 658.478 |
dewey-sort | 3658.478 |
dewey-tens | 650 - Management and auxiliary services |
discipline | Wirtschaftswissenschaften |
discipline_str_mv | Wirtschaftswissenschaften |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02064nmm a2200421zc 4500</leader><controlfield tag="001">BV046684178</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211018 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">200423s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838826901</subfield><subfield code="9">978-1-83882-690-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC5802136</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL5802136</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-4-NLEBK)2177837</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1108551773</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046684178</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">658.478</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rahalkar, Sagar Ajay</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1179109120</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The the Complete Metasploit Guide</subfield><subfield code="b">Explore Effective Penetration Testing Techniques with Metasploit</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing, Limited</subfield><subfield code="c">2019</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (651 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure ..</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security-Management.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Metasploit (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks-Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jaswal, Nipun</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Rahalkar, Sagar</subfield><subfield code="t">The the Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit</subfield><subfield code="d">Birmingham : Packt Publishing, Limited,c2019</subfield><subfield code="z">9781838822477</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-5-WPSE</subfield><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032094962</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=2177837</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-4-NLEBK</subfield><subfield code="q">UBY01_DDA21</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046684178 |
illustrated | Not Illustrated |
index_date | 2024-07-03T14:24:42Z |
indexdate | 2024-07-10T08:51:09Z |
institution | BVB |
isbn | 9781838826901 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032094962 |
oclc_num | 1108551773 |
open_access_boolean | |
owner | DE-706 |
owner_facet | DE-706 |
physical | 1 online resource (651 pages) |
psigel | ZDB-30-PQE ZDB-5-WPSE ZDB-4-NLEBK ZDB-4-NLEBK UBY01_DDA21 |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt Publishing, Limited |
record_format | marc |
spelling | Rahalkar, Sagar Ajay Verfasser (DE-588)1179109120 aut The the Complete Metasploit Guide Explore Effective Penetration Testing Techniques with Metasploit Birmingham Packt Publishing, Limited 2019 © 2019 1 online resource (651 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure .. Computer security-Management. Metasploit (Electronic resource) Computer networks-Security measures Jaswal, Nipun Sonstige oth Erscheint auch als Druck-Ausgabe Rahalkar, Sagar The the Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit Birmingham : Packt Publishing, Limited,c2019 9781838822477 |
spellingShingle | Rahalkar, Sagar Ajay The the Complete Metasploit Guide Explore Effective Penetration Testing Techniques with Metasploit Computer security-Management. Metasploit (Electronic resource) Computer networks-Security measures |
title | The the Complete Metasploit Guide Explore Effective Penetration Testing Techniques with Metasploit |
title_auth | The the Complete Metasploit Guide Explore Effective Penetration Testing Techniques with Metasploit |
title_exact_search | The the Complete Metasploit Guide Explore Effective Penetration Testing Techniques with Metasploit |
title_exact_search_txtP | The the Complete Metasploit Guide Explore Effective Penetration Testing Techniques with Metasploit |
title_full | The the Complete Metasploit Guide Explore Effective Penetration Testing Techniques with Metasploit |
title_fullStr | The the Complete Metasploit Guide Explore Effective Penetration Testing Techniques with Metasploit |
title_full_unstemmed | The the Complete Metasploit Guide Explore Effective Penetration Testing Techniques with Metasploit |
title_short | The the Complete Metasploit Guide |
title_sort | the the complete metasploit guide explore effective penetration testing techniques with metasploit |
title_sub | Explore Effective Penetration Testing Techniques with Metasploit |
topic | Computer security-Management. Metasploit (Electronic resource) Computer networks-Security measures |
topic_facet | Computer security-Management. Metasploit (Electronic resource) Computer networks-Security measures |
work_keys_str_mv | AT rahalkarsagarajay thethecompletemetasploitguideexploreeffectivepenetrationtestingtechniqueswithmetasploit AT jaswalnipun thethecompletemetasploitguideexploreeffectivepenetrationtestingtechniqueswithmetasploit |