Metasploit toolkit for penetration testing, exploit development, and vulnerability research /:
Metasploit is the #5 most commonly used network security tool according to a poll conducted by www.insecure.org, yet there are no books.
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Burlington, MA :
Syngress,
©2007.
|
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | Metasploit is the #5 most commonly used network security tool according to a poll conducted by www.insecure.org, yet there are no books. |
Beschreibung: | 1 online resource (xvi, 272 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780080549255 008054925X 9781597490740 1597490741 1281112585 9781281112583 9786611112585 6611112588 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn190823231 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 080115s2007 maua ob 001 0 eng d | ||
040 | |a N$T |b eng |e pn |c N$T |d YDXCP |d OCLCQ |d IDEBK |d ZCU |d E7B |d OCLCQ |d MERUC |d OCLCQ |d OCLCF |d OPELS |d BTCTA |d BAKER |d DKDLA |d UMI |d DEBSZ |d DEBBG |d OCLCQ |d REB |d OCLCO |d OCL |d OCLCQ |d OCLCO |d COO |d AGLDB |d Z5A |d OCLCQ |d JBG |d OCLCO |d OCLCA |d D6H |d UAB |d OCLCQ |d VTS |d CEF |d WYU |d STF |d LEAUB |d AU@ |d VT2 |d BRF |d OCLCQ |d OCLCO |d VLY |d M8D |d OCLCO |d OCLCQ |d UPM |d OCLCQ |d OCLCO |d SXB |d OCLCQ |d OCLCO | ||
019 | |a 150340931 |a 162131454 |a 488134762 |a 507326483 |a 647691380 |a 871201833 |a 1065648017 |a 1103280372 |a 1113449870 |a 1129356693 |a 1152971928 |a 1160093229 |a 1162026345 |a 1179507728 |a 1192333906 |a 1206316405 |a 1240518843 | ||
020 | |a 9780080549255 |q (electronic bk.) | ||
020 | |a 008054925X |q (electronic bk.) | ||
020 | |a 9781597490740 |q (pbk.) | ||
020 | |a 1597490741 |q (pbk.) | ||
020 | |a 1281112585 | ||
020 | |a 9781281112583 | ||
020 | |a 9786611112585 | ||
020 | |a 6611112588 | ||
035 | |a (OCoLC)190823231 |z (OCoLC)150340931 |z (OCoLC)162131454 |z (OCoLC)488134762 |z (OCoLC)507326483 |z (OCoLC)647691380 |z (OCoLC)871201833 |z (OCoLC)1065648017 |z (OCoLC)1103280372 |z (OCoLC)1113449870 |z (OCoLC)1129356693 |z (OCoLC)1152971928 |z (OCoLC)1160093229 |z (OCoLC)1162026345 |z (OCoLC)1179507728 |z (OCoLC)1192333906 |z (OCoLC)1206316405 |z (OCoLC)1240518843 | ||
037 | |a 133683:133808 |b Elsevier Science & Technology |n http://www.sciencedirect.com | ||
050 | 4 | |a QA76.9.A25 |b M396 2007eb | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Maynor, David. |1 https://id.oclc.org/worldcat/entity/E39PCjGJT8vxtqWMkWWb8qVRDq |0 http://id.loc.gov/authorities/names/no2007123414 | |
245 | 1 | 0 | |a Metasploit toolkit for penetration testing, exploit development, and vulnerability research / |c David Maynor, K.K. Mookhey. |
260 | |a Burlington, MA : |b Syngress, |c ©2007. | ||
300 | |a 1 online resource (xvi, 272 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
588 | 0 | |a Print version record. | |
505 | 0 | |a Front Cover; Metasploit Toolkit: For Penetration Testing, Exploit Development, and Vulnerability Reasearch; Copyright Page; Contents; Chapter 1. Introduction to Metasploit; Chapter 2. Architecture, Environment, and Installation; Chapter 3. Metasploit Framework and Advanced Environment Configurations; Chapter 4. Advanced Payloads and Add-on Modules; Chapter 5. Adding New Payloads; Case Studies; Appendix A. Advantages of Network Vulnerability Testing with Metasploit 3.0; Appendix B. Building a Test Lab for Penetration Testing; Appendix C. Glossary of Technology and Terminology; Index. | |
520 | |a Metasploit is the #5 most commonly used network security tool according to a poll conducted by www.insecure.org, yet there are no books. | ||
546 | |a English. | ||
630 | 0 | 0 | |a Metasploit (Electronic resource) |0 http://id.loc.gov/authorities/names/n2011043654 |
630 | 0 | 7 | |a Metasploit (Electronic resource) |2 fast |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Open source software. |0 http://id.loc.gov/authorities/subjects/sh99003437 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Logiciels libres. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Open source software |2 fast | |
700 | 1 | |a Mookhey, K. K. |1 https://id.oclc.org/worldcat/entity/E39PCjFkGyjmMfTfFHrJwFKYWC |0 http://id.loc.gov/authorities/names/no2007123417 | |
776 | 0 | 8 | |i Print version: |a Maynor, David. |t Metasploit toolkit for penetration testing, exploit development, and vulnerability research. |d Burlington, MA : Syngress, ©2007 |z 1597490741 |z 9781597490740 |w (DLC) 2007299879 |w (OCoLC)173084169 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214743 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9781597490740 |3 Volltext |
938 | |a Baker & Taylor |b BKTY |c 59.95 |d 44.96 |i 1597490741 |n 0006736969 |s active | ||
938 | |a Baker and Taylor |b BTCP |n BK0006736969 | ||
938 | |a ebrary |b EBRY |n ebr10204226 | ||
938 | |a EBSCOhost |b EBSC |n 214743 | ||
938 | |a YBP Library Services |b YANK |n 2758394 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn190823231 |
---|---|
_version_ | 1816881659416412160 |
adam_text | |
any_adam_object | |
author | Maynor, David |
author2 | Mookhey, K. K. |
author2_role | |
author2_variant | k k m kk kkm |
author_GND | http://id.loc.gov/authorities/names/no2007123414 http://id.loc.gov/authorities/names/no2007123417 |
author_facet | Maynor, David Mookhey, K. K. |
author_role | |
author_sort | Maynor, David |
author_variant | d m dm |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 M396 2007eb |
callnumber-search | QA76.9.A25 M396 2007eb |
callnumber-sort | QA 276.9 A25 M396 42007EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Front Cover; Metasploit Toolkit: For Penetration Testing, Exploit Development, and Vulnerability Reasearch; Copyright Page; Contents; Chapter 1. Introduction to Metasploit; Chapter 2. Architecture, Environment, and Installation; Chapter 3. Metasploit Framework and Advanced Environment Configurations; Chapter 4. Advanced Payloads and Add-on Modules; Chapter 5. Adding New Payloads; Case Studies; Appendix A. Advantages of Network Vulnerability Testing with Metasploit 3.0; Appendix B. Building a Test Lab for Penetration Testing; Appendix C. Glossary of Technology and Terminology; Index. |
ctrlnum | (OCoLC)190823231 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04691cam a2200721 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn190823231</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">080115s2007 maua ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">N$T</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">IDEBK</subfield><subfield code="d">ZCU</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OPELS</subfield><subfield code="d">BTCTA</subfield><subfield code="d">BAKER</subfield><subfield code="d">DKDLA</subfield><subfield code="d">UMI</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">DEBBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">REB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">COO</subfield><subfield code="d">AGLDB</subfield><subfield code="d">Z5A</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCA</subfield><subfield code="d">D6H</subfield><subfield code="d">UAB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">WYU</subfield><subfield code="d">STF</subfield><subfield code="d">LEAUB</subfield><subfield code="d">AU@</subfield><subfield code="d">VT2</subfield><subfield code="d">BRF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">VLY</subfield><subfield code="d">M8D</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UPM</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">SXB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">150340931</subfield><subfield code="a">162131454</subfield><subfield code="a">488134762</subfield><subfield code="a">507326483</subfield><subfield code="a">647691380</subfield><subfield code="a">871201833</subfield><subfield code="a">1065648017</subfield><subfield code="a">1103280372</subfield><subfield code="a">1113449870</subfield><subfield code="a">1129356693</subfield><subfield code="a">1152971928</subfield><subfield code="a">1160093229</subfield><subfield code="a">1162026345</subfield><subfield code="a">1179507728</subfield><subfield code="a">1192333906</subfield><subfield code="a">1206316405</subfield><subfield code="a">1240518843</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780080549255</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">008054925X</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597490740</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597490741</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1281112585</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781281112583</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9786611112585</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">6611112588</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)190823231</subfield><subfield code="z">(OCoLC)150340931</subfield><subfield code="z">(OCoLC)162131454</subfield><subfield code="z">(OCoLC)488134762</subfield><subfield code="z">(OCoLC)507326483</subfield><subfield code="z">(OCoLC)647691380</subfield><subfield code="z">(OCoLC)871201833</subfield><subfield code="z">(OCoLC)1065648017</subfield><subfield code="z">(OCoLC)1103280372</subfield><subfield code="z">(OCoLC)1113449870</subfield><subfield code="z">(OCoLC)1129356693</subfield><subfield code="z">(OCoLC)1152971928</subfield><subfield code="z">(OCoLC)1160093229</subfield><subfield code="z">(OCoLC)1162026345</subfield><subfield code="z">(OCoLC)1179507728</subfield><subfield code="z">(OCoLC)1192333906</subfield><subfield code="z">(OCoLC)1206316405</subfield><subfield code="z">(OCoLC)1240518843</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">133683:133808</subfield><subfield code="b">Elsevier Science & Technology</subfield><subfield code="n">http://www.sciencedirect.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">M396 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Maynor, David.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjGJT8vxtqWMkWWb8qVRDq</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007123414</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Metasploit toolkit for penetration testing, exploit development, and vulnerability research /</subfield><subfield code="c">David Maynor, K.K. Mookhey.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Burlington, MA :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xvi, 272 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Front Cover; Metasploit Toolkit: For Penetration Testing, Exploit Development, and Vulnerability Reasearch; Copyright Page; Contents; Chapter 1. Introduction to Metasploit; Chapter 2. Architecture, Environment, and Installation; Chapter 3. Metasploit Framework and Advanced Environment Configurations; Chapter 4. Advanced Payloads and Add-on Modules; Chapter 5. Adding New Payloads; Case Studies; Appendix A. Advantages of Network Vulnerability Testing with Metasploit 3.0; Appendix B. Building a Test Lab for Penetration Testing; Appendix C. Glossary of Technology and Terminology; Index.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Metasploit is the #5 most commonly used network security tool according to a poll conducted by www.insecure.org, yet there are no books.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Metasploit (Electronic resource)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2011043654</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Metasploit (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Open source software.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh99003437</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels libres.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Open source software</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mookhey, K. K.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjFkGyjmMfTfFHrJwFKYWC</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007123417</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Maynor, David.</subfield><subfield code="t">Metasploit toolkit for penetration testing, exploit development, and vulnerability research.</subfield><subfield code="d">Burlington, MA : Syngress, ©2007</subfield><subfield code="z">1597490741</subfield><subfield code="z">9781597490740</subfield><subfield code="w">(DLC) 2007299879</subfield><subfield code="w">(OCoLC)173084169</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214743</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9781597490740</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker & Taylor</subfield><subfield code="b">BKTY</subfield><subfield code="c">59.95</subfield><subfield code="d">44.96</subfield><subfield code="i">1597490741</subfield><subfield code="n">0006736969</subfield><subfield code="s">active</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Baker and Taylor</subfield><subfield code="b">BTCP</subfield><subfield code="n">BK0006736969</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ebrary</subfield><subfield code="b">EBRY</subfield><subfield code="n">ebr10204226</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">214743</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2758394</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn190823231 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:16:14Z |
institution | BVB |
isbn | 9780080549255 008054925X 9781597490740 1597490741 1281112585 9781281112583 9786611112585 6611112588 |
language | English |
oclc_num | 190823231 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xvi, 272 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | Syngress, |
record_format | marc |
spelling | Maynor, David. https://id.oclc.org/worldcat/entity/E39PCjGJT8vxtqWMkWWb8qVRDq http://id.loc.gov/authorities/names/no2007123414 Metasploit toolkit for penetration testing, exploit development, and vulnerability research / David Maynor, K.K. Mookhey. Burlington, MA : Syngress, ©2007. 1 online resource (xvi, 272 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Includes bibliographical references and index. Print version record. Front Cover; Metasploit Toolkit: For Penetration Testing, Exploit Development, and Vulnerability Reasearch; Copyright Page; Contents; Chapter 1. Introduction to Metasploit; Chapter 2. Architecture, Environment, and Installation; Chapter 3. Metasploit Framework and Advanced Environment Configurations; Chapter 4. Advanced Payloads and Add-on Modules; Chapter 5. Adding New Payloads; Case Studies; Appendix A. Advantages of Network Vulnerability Testing with Metasploit 3.0; Appendix B. Building a Test Lab for Penetration Testing; Appendix C. Glossary of Technology and Terminology; Index. Metasploit is the #5 most commonly used network security tool according to a poll conducted by www.insecure.org, yet there are no books. English. Metasploit (Electronic resource) http://id.loc.gov/authorities/names/n2011043654 Metasploit (Electronic resource) fast Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Logiciels libres. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Open source software fast Mookhey, K. K. https://id.oclc.org/worldcat/entity/E39PCjFkGyjmMfTfFHrJwFKYWC http://id.loc.gov/authorities/names/no2007123417 Print version: Maynor, David. Metasploit toolkit for penetration testing, exploit development, and vulnerability research. Burlington, MA : Syngress, ©2007 1597490741 9781597490740 (DLC) 2007299879 (OCoLC)173084169 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214743 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9781597490740 Volltext |
spellingShingle | Maynor, David Metasploit toolkit for penetration testing, exploit development, and vulnerability research / Front Cover; Metasploit Toolkit: For Penetration Testing, Exploit Development, and Vulnerability Reasearch; Copyright Page; Contents; Chapter 1. Introduction to Metasploit; Chapter 2. Architecture, Environment, and Installation; Chapter 3. Metasploit Framework and Advanced Environment Configurations; Chapter 4. Advanced Payloads and Add-on Modules; Chapter 5. Adding New Payloads; Case Studies; Appendix A. Advantages of Network Vulnerability Testing with Metasploit 3.0; Appendix B. Building a Test Lab for Penetration Testing; Appendix C. Glossary of Technology and Terminology; Index. Metasploit (Electronic resource) http://id.loc.gov/authorities/names/n2011043654 Metasploit (Electronic resource) fast Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Logiciels libres. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Open source software fast |
subject_GND | http://id.loc.gov/authorities/names/n2011043654 http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh99003437 https://id.nlm.nih.gov/mesh/D016494 |
title | Metasploit toolkit for penetration testing, exploit development, and vulnerability research / |
title_auth | Metasploit toolkit for penetration testing, exploit development, and vulnerability research / |
title_exact_search | Metasploit toolkit for penetration testing, exploit development, and vulnerability research / |
title_full | Metasploit toolkit for penetration testing, exploit development, and vulnerability research / David Maynor, K.K. Mookhey. |
title_fullStr | Metasploit toolkit for penetration testing, exploit development, and vulnerability research / David Maynor, K.K. Mookhey. |
title_full_unstemmed | Metasploit toolkit for penetration testing, exploit development, and vulnerability research / David Maynor, K.K. Mookhey. |
title_short | Metasploit toolkit for penetration testing, exploit development, and vulnerability research / |
title_sort | metasploit toolkit for penetration testing exploit development and vulnerability research |
topic | Metasploit (Electronic resource) http://id.loc.gov/authorities/names/n2011043654 Metasploit (Electronic resource) fast Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Open source software. http://id.loc.gov/authorities/subjects/sh99003437 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Logiciels libres. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Open source software fast |
topic_facet | Metasploit (Electronic resource) Computer security. Open source software. Computer Security Sécurité informatique. Logiciels libres. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security Open source software |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=214743 https://www.sciencedirect.com/science/book/9781597490740 |
work_keys_str_mv | AT maynordavid metasploittoolkitforpenetrationtestingexploitdevelopmentandvulnerabilityresearch AT mookheykk metasploittoolkitforpenetrationtestingexploitdevelopmentandvulnerabilityresearch |