BackTrack 4 :: assuring security by penetration testing /
Annotation
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt,
©2011.
|
Schriftenreihe: | Community experience distilled.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Annotation |
Beschreibung: | 1 online resource (vii, 371 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781849513951 1849513953 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn780165941 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 120315s2011 enka ob 001 0 eng d | ||
040 | |a UMI |b eng |e pn |c UMI |d N$T |d YDXCP |d S4S |d COO |d OCLCQ |d DEBSZ |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d OCLCF |d OCLCO |d OCLCQ |d OCLCO |d JBG |d AGLDB |d ICA |d Z5A |d OCLCA |d D6H |d OCLCQ |d OCLCO |d OCLCA |d VTS |d CEF |d NLE |d UKMGB |d WYU |d STF |d AU@ |d OCLCQ |d OCLCO |d K6U |d OCLCO |d OCLCQ |d OCLCO |d OCLCQ |d OCLCL | ||
015 | |a GBB6G4041 |2 bnb | ||
016 | 7 | |a 018012003 |2 Uk | |
019 | |a 726938483 | ||
020 | |a 9781849513951 |q (electronic bk.) | ||
020 | |a 1849513953 |q (electronic bk.) | ||
020 | |z 9781849513944 |q (pbk.) | ||
020 | |z 1849513945 |q (pbk.) | ||
024 | 3 | |a 9781849513951 | |
035 | |a (OCoLC)780165941 |z (OCoLC)726938483 | ||
037 | |a CL0500000128 |b Safari Books Online | ||
050 | 4 | |a QA76.9.A25 |b A45 2011 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
100 | 1 | |a Ali, Shakeel. | |
245 | 1 | 0 | |a BackTrack 4 : |b assuring security by penetration testing / |c Shakeel Ali, Tedi Heriyanto. |
246 | 3 | |a BackTrack four | |
246 | 3 | |a Back Track 4 | |
246 | 3 | 0 | |a Assuring security by penetration testing |
260 | |a Birmingham, UK : |b Packt, |c ©2011. | ||
300 | |a 1 online resource (vii, 371 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Community experience distilled | |
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and index. | ||
520 | 8 | |a Annotation |b BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your network.<br /><br />BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step strategy. It offers all the essential lab preparation and testing procedures to reflect real-world attack scenarios from your business perspective in today's digital age.<br /><br />The authors' experience and expertise enables them to reveal the industry's best approach for logical and systematic penetration testing.<br /><br />The first and so far only book on BackTrack OS starts with lab preparation and testing procedures, explaining the basic installation and configuration set up, discussing types of penetration testing (black-box and white-box), uncovering open security testing methodologies, and proposing the BackTrack specific testing process. The authors discuss a number of security assessment tools necessary to conduct penetration testing in their respective categories (target scoping, information gathering, discovery, enumeration, vulnerability mapping, social engineering, exploitation, privilege escalation, maintaining access, and reporting), following the formal testing methodology. Each of these tools is illustrated with real-world examples to highlight their practical usage and proven configuration techniques. The authors also provide extra weaponry treasures and cite key resources that may be crucial to any professional penetration tester.<br /><br />This book serves as a single professional, practical, and expert guide to developing hardcore penetration testing skills from scratch. You will be trained to make the best use of BackTrack OS either in a commercial environment or an experimental test bed.<br /><br />A tactical example-driven guide for mastering the penetration testing skills with BackTrack to identify, detect, and exploit vulnerabilities at your digital doorstep. | |
505 | 0 | 0 | |t All-in-one intelligence gatheringMaltego -- |t Documenting the information -- |t Dradis -- |t Summary -- |g 5. |t Target Discovery -- |t Introduction -- |t Identifying the target machine -- |t ping -- |t arping -- |t arping -- |g 2. -- |t fping -- |t genlist -- |t hping -- |g 2. -- |t hping -- |g 3. -- |t lanmap -- |t nbtscan -- |t nping -- |t onesixtyone -- |t OS fingerprinting -- |t p -- |g 0. |t f -- |t xprobe -- |g 2. -- |t Summary -- |g 6. |t Enumerating Target -- |t Port scanning -- |t AutoScan -- |t Netifera -- |t Nmap -- |t Nmap target specification -- |t Nmap TCP scan options -- |t Nmap UDP scan options -- |t Nmap port specification -- |t Nmap output options -- |t Nmap timing options -- |t Nmap scripting engine -- |t Unicornscan -- |t Zenmap -- |t Service enumeration -- |t Amap -- |t Httprint -- |t Httsquash. |
505 | 0 | 0 | |t BackTrack 4: Assuring Security by Penetration Testing -- |t BackTrack 4: Assuring Security by Penetration Testing -- |t Credits -- |t About the Authors -- |t About the Reviewers -- |t www.PacktPub.com -- |t Support files, eBooks, discount offers and more -- |t Why Subscribe -- |t Free Access for Packt account holders -- |t What this book covers -- |t What you need for this book -- |t Who this book is for -- |t Conventions -- |t Reader feedback -- |t Customer support -- |t Errata -- |t Piracy -- |t Questions -- |t I. Lab Preparation and Testing Procedures -- |g 1. |t Beginning with BackTrack -- |t History -- |t BackTrack purpose -- |t Getting BackTrack -- |t Using BackTrack -- |t Live DVD. |
505 | 0 | 0 | |t Installing to hard diskInstallation in real machine -- |t Installation in VirtualBox -- |t Portable BackTrack -- |t Configuring network connection -- |t Ethernet setup -- |t Wireless setup -- |t Starting the network service -- |t Updating BackTrack -- |t Updating software applications -- |t Updating the kernel -- |t Installing additional weapons -- |t Nessus vulnerability scanner -- |t WebSecurify -- |t Customizing BackTrack -- |t Summary -- |g 2. |t Penetration Testing Methodology -- |t Types of penetration testing -- |t Black-box testing -- |t White-box testing -- |t Vulnerability assessment versus penetration testing -- |t Security testing methodologies. |
505 | 0 | 0 | |t Open Source Security Testing Methodology Manual (OSSTMM)Key features and benefits -- |t Information Systems Security Assessment Framework (ISSAF) -- |t Key features and benefits -- |t Open Web Application Security Project (OWASP) Top Ten -- |t Key features and benefits -- |t Web Application Security Consortium Threat Classification (WASC-TC) -- |t Key features and benefits -- |t BackTrack testing methodology -- |t Target scoping -- |t Information gathering -- |t Target discovery -- |t Enumerating target -- |t Vulnerability mapping -- |t Social engineering -- |t Target exploitation -- |t Privilege escalation -- |t Maintaining access -- |t Documentation and reporting. |
505 | 0 | 0 | |t The ethicsSummary -- |t II. Penetration Testers Armory -- |g 3. |t Target Scoping -- |t Gathering client requirements -- |t Customer requirements form -- |t Deliverables assessment form -- |t Preparing the test plan -- |t Test plan checklist -- |t Profiling test boundaries -- |t Defining business objectives -- |t Project management and scheduling -- |t Summary -- |g 4. |t Information Gathering -- |t Public resources -- |t Document gathering -- |t Metagoofil -- |t DNS information -- |t dnswalk -- |t dnsenum -- |t dnsmap -- |t dnsmap-bulk -- |t dnsrecon -- |t fierce -- |t Route information -- |g 0. |t trace -- |t dmitry -- |t itrace -- |t tcpraceroute -- |t tctrace -- |t Utilizing search engines -- |t goorecon -- |t theharvester. |
630 | 0 | 0 | |a Linux. |0 http://id.loc.gov/authorities/names/n94087892 |
630 | 0 | 7 | |a Linux. |2 blmlsh |
630 | 0 | 7 | |a Linux |2 fast |
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Computers |x Access control |x Testing. | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computers |x Access control |x Testing |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
700 | 1 | |a Heriyanto, Tedi. | |
758 | |i has work: |a BackTrack 4 (Text) |1 https://id.oclc.org/worldcat/entity/E39PCYCWv6cPgX3fkmBpjmFKbd |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Ali, Shakeel. |t BackTrack 4. |d Birmingham, UK : Packt, ©2011 |z 9781849513944 |w (OCoLC)728008053 |
830 | 0 | |a Community experience distilled. |0 http://id.loc.gov/authorities/names/no2011030603 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365677 |3 Volltext |
938 | |a EBSCOhost |b EBSC |n 365677 | ||
938 | |a YBP Library Services |b YANK |n 5559393 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn780165941 |
---|---|
_version_ | 1816881788906110977 |
adam_text | |
any_adam_object | |
author | Ali, Shakeel |
author2 | Heriyanto, Tedi |
author2_role | |
author2_variant | t h th |
author_facet | Ali, Shakeel Heriyanto, Tedi |
author_role | |
author_sort | Ali, Shakeel |
author_variant | s a sa |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 A45 2011 |
callnumber-search | QA76.9.A25 A45 2011 |
callnumber-sort | QA 276.9 A25 A45 42011 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | All-in-one intelligence gatheringMaltego -- Documenting the information -- Dradis -- Summary -- Target Discovery -- Introduction -- Identifying the target machine -- ping -- arping -- fping -- genlist -- hping -- lanmap -- nbtscan -- nping -- onesixtyone -- OS fingerprinting -- p -- f -- xprobe -- Enumerating Target -- Port scanning -- AutoScan -- Netifera -- Nmap -- Nmap target specification -- Nmap TCP scan options -- Nmap UDP scan options -- Nmap port specification -- Nmap output options -- Nmap timing options -- Nmap scripting engine -- Unicornscan -- Zenmap -- Service enumeration -- Amap -- Httprint -- Httsquash. BackTrack 4: Assuring Security by Penetration Testing -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe -- Free Access for Packt account holders -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Errata -- Piracy -- Questions -- I. Lab Preparation and Testing Procedures -- Beginning with BackTrack -- History -- BackTrack purpose -- Getting BackTrack -- Using BackTrack -- Live DVD. Installing to hard diskInstallation in real machine -- Installation in VirtualBox -- Portable BackTrack -- Configuring network connection -- Ethernet setup -- Wireless setup -- Starting the network service -- Updating BackTrack -- Updating software applications -- Updating the kernel -- Installing additional weapons -- Nessus vulnerability scanner -- WebSecurify -- Customizing BackTrack -- Penetration Testing Methodology -- Types of penetration testing -- Black-box testing -- White-box testing -- Vulnerability assessment versus penetration testing -- Security testing methodologies. Open Source Security Testing Methodology Manual (OSSTMM)Key features and benefits -- Information Systems Security Assessment Framework (ISSAF) -- Key features and benefits -- Open Web Application Security Project (OWASP) Top Ten -- Web Application Security Consortium Threat Classification (WASC-TC) -- BackTrack testing methodology -- Target scoping -- Information gathering -- Target discovery -- Enumerating target -- Vulnerability mapping -- Social engineering -- Target exploitation -- Privilege escalation -- Maintaining access -- Documentation and reporting. The ethicsSummary -- II. Penetration Testers Armory -- Target Scoping -- Gathering client requirements -- Customer requirements form -- Deliverables assessment form -- Preparing the test plan -- Test plan checklist -- Profiling test boundaries -- Defining business objectives -- Project management and scheduling -- Information Gathering -- Public resources -- Document gathering -- Metagoofil -- DNS information -- dnswalk -- dnsenum -- dnsmap -- dnsmap-bulk -- dnsrecon -- fierce -- Route information -- trace -- dmitry -- itrace -- tcpraceroute -- tctrace -- Utilizing search engines -- goorecon -- theharvester. |
ctrlnum | (OCoLC)780165941 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>08862cam a2200793 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn780165941</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">120315s2011 enka ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">S4S</subfield><subfield code="d">COO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">JBG</subfield><subfield code="d">AGLDB</subfield><subfield code="d">ICA</subfield><subfield code="d">Z5A</subfield><subfield code="d">OCLCA</subfield><subfield code="d">D6H</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCA</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">NLE</subfield><subfield code="d">UKMGB</subfield><subfield code="d">WYU</subfield><subfield code="d">STF</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB6G4041</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">018012003</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">726938483</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781849513951</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1849513953</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781849513944</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1849513945</subfield><subfield code="q">(pbk.)</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9781849513951</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)780165941</subfield><subfield code="z">(OCoLC)726938483</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0500000128</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">A45 2011</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ali, Shakeel.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">BackTrack 4 :</subfield><subfield code="b">assuring security by penetration testing /</subfield><subfield code="c">Shakeel Ali, Tedi Heriyanto.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">BackTrack four</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Back Track 4</subfield></datafield><datafield tag="246" ind1="3" ind2="0"><subfield code="a">Assuring security by penetration testing</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt,</subfield><subfield code="c">©2011.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (vii, 371 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Community experience distilled</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="520" ind1="8" ind2=" "><subfield code="a">Annotation</subfield><subfield code="b">BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your network.<br /><br />BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step strategy. It offers all the essential lab preparation and testing procedures to reflect real-world attack scenarios from your business perspective in today's digital age.<br /><br />The authors' experience and expertise enables them to reveal the industry's best approach for logical and systematic penetration testing.<br /><br />The first and so far only book on BackTrack OS starts with lab preparation and testing procedures, explaining the basic installation and configuration set up, discussing types of penetration testing (black-box and white-box), uncovering open security testing methodologies, and proposing the BackTrack specific testing process. The authors discuss a number of security assessment tools necessary to conduct penetration testing in their respective categories (target scoping, information gathering, discovery, enumeration, vulnerability mapping, social engineering, exploitation, privilege escalation, maintaining access, and reporting), following the formal testing methodology. Each of these tools is illustrated with real-world examples to highlight their practical usage and proven configuration techniques. The authors also provide extra weaponry treasures and cite key resources that may be crucial to any professional penetration tester.<br /><br />This book serves as a single professional, practical, and expert guide to developing hardcore penetration testing skills from scratch. You will be trained to make the best use of BackTrack OS either in a commercial environment or an experimental test bed.<br /><br />A tactical example-driven guide for mastering the penetration testing skills with BackTrack to identify, detect, and exploit vulnerabilities at your digital doorstep.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">All-in-one intelligence gatheringMaltego --</subfield><subfield code="t">Documenting the information --</subfield><subfield code="t">Dradis --</subfield><subfield code="t">Summary --</subfield><subfield code="g">5.</subfield><subfield code="t">Target Discovery --</subfield><subfield code="t">Introduction --</subfield><subfield code="t">Identifying the target machine --</subfield><subfield code="t">ping --</subfield><subfield code="t">arping --</subfield><subfield code="t">arping --</subfield><subfield code="g">2. --</subfield><subfield code="t">fping --</subfield><subfield code="t">genlist --</subfield><subfield code="t">hping --</subfield><subfield code="g">2. --</subfield><subfield code="t">hping --</subfield><subfield code="g">3. --</subfield><subfield code="t">lanmap --</subfield><subfield code="t">nbtscan --</subfield><subfield code="t">nping --</subfield><subfield code="t">onesixtyone --</subfield><subfield code="t">OS fingerprinting --</subfield><subfield code="t">p --</subfield><subfield code="g">0.</subfield><subfield code="t">f --</subfield><subfield code="t">xprobe --</subfield><subfield code="g">2. --</subfield><subfield code="t">Summary --</subfield><subfield code="g">6.</subfield><subfield code="t">Enumerating Target --</subfield><subfield code="t">Port scanning --</subfield><subfield code="t">AutoScan --</subfield><subfield code="t">Netifera --</subfield><subfield code="t">Nmap --</subfield><subfield code="t">Nmap target specification --</subfield><subfield code="t">Nmap TCP scan options --</subfield><subfield code="t">Nmap UDP scan options --</subfield><subfield code="t">Nmap port specification --</subfield><subfield code="t">Nmap output options --</subfield><subfield code="t">Nmap timing options --</subfield><subfield code="t">Nmap scripting engine --</subfield><subfield code="t">Unicornscan --</subfield><subfield code="t">Zenmap --</subfield><subfield code="t">Service enumeration --</subfield><subfield code="t">Amap --</subfield><subfield code="t">Httprint --</subfield><subfield code="t">Httsquash.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">BackTrack 4: Assuring Security by Penetration Testing --</subfield><subfield code="t">BackTrack 4: Assuring Security by Penetration Testing --</subfield><subfield code="t">Credits --</subfield><subfield code="t">About the Authors --</subfield><subfield code="t">About the Reviewers --</subfield><subfield code="t">www.PacktPub.com --</subfield><subfield code="t">Support files, eBooks, discount offers and more --</subfield><subfield code="t">Why Subscribe --</subfield><subfield code="t">Free Access for Packt account holders --</subfield><subfield code="t">What this book covers --</subfield><subfield code="t">What you need for this book --</subfield><subfield code="t">Who this book is for --</subfield><subfield code="t">Conventions --</subfield><subfield code="t">Reader feedback --</subfield><subfield code="t">Customer support --</subfield><subfield code="t">Errata --</subfield><subfield code="t">Piracy --</subfield><subfield code="t">Questions --</subfield><subfield code="t">I. Lab Preparation and Testing Procedures --</subfield><subfield code="g">1.</subfield><subfield code="t">Beginning with BackTrack --</subfield><subfield code="t">History --</subfield><subfield code="t">BackTrack purpose --</subfield><subfield code="t">Getting BackTrack --</subfield><subfield code="t">Using BackTrack --</subfield><subfield code="t">Live DVD.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Installing to hard diskInstallation in real machine --</subfield><subfield code="t">Installation in VirtualBox --</subfield><subfield code="t">Portable BackTrack --</subfield><subfield code="t">Configuring network connection --</subfield><subfield code="t">Ethernet setup --</subfield><subfield code="t">Wireless setup --</subfield><subfield code="t">Starting the network service --</subfield><subfield code="t">Updating BackTrack --</subfield><subfield code="t">Updating software applications --</subfield><subfield code="t">Updating the kernel --</subfield><subfield code="t">Installing additional weapons --</subfield><subfield code="t">Nessus vulnerability scanner --</subfield><subfield code="t">WebSecurify --</subfield><subfield code="t">Customizing BackTrack --</subfield><subfield code="t">Summary --</subfield><subfield code="g">2.</subfield><subfield code="t">Penetration Testing Methodology --</subfield><subfield code="t">Types of penetration testing --</subfield><subfield code="t">Black-box testing --</subfield><subfield code="t">White-box testing --</subfield><subfield code="t">Vulnerability assessment versus penetration testing --</subfield><subfield code="t">Security testing methodologies.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Open Source Security Testing Methodology Manual (OSSTMM)Key features and benefits --</subfield><subfield code="t">Information Systems Security Assessment Framework (ISSAF) --</subfield><subfield code="t">Key features and benefits --</subfield><subfield code="t">Open Web Application Security Project (OWASP) Top Ten --</subfield><subfield code="t">Key features and benefits --</subfield><subfield code="t">Web Application Security Consortium Threat Classification (WASC-TC) --</subfield><subfield code="t">Key features and benefits --</subfield><subfield code="t">BackTrack testing methodology --</subfield><subfield code="t">Target scoping --</subfield><subfield code="t">Information gathering --</subfield><subfield code="t">Target discovery --</subfield><subfield code="t">Enumerating target --</subfield><subfield code="t">Vulnerability mapping --</subfield><subfield code="t">Social engineering --</subfield><subfield code="t">Target exploitation --</subfield><subfield code="t">Privilege escalation --</subfield><subfield code="t">Maintaining access --</subfield><subfield code="t">Documentation and reporting.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">The ethicsSummary --</subfield><subfield code="t">II. Penetration Testers Armory --</subfield><subfield code="g">3.</subfield><subfield code="t">Target Scoping --</subfield><subfield code="t">Gathering client requirements --</subfield><subfield code="t">Customer requirements form --</subfield><subfield code="t">Deliverables assessment form --</subfield><subfield code="t">Preparing the test plan --</subfield><subfield code="t">Test plan checklist --</subfield><subfield code="t">Profiling test boundaries --</subfield><subfield code="t">Defining business objectives --</subfield><subfield code="t">Project management and scheduling --</subfield><subfield code="t">Summary --</subfield><subfield code="g">4.</subfield><subfield code="t">Information Gathering --</subfield><subfield code="t">Public resources --</subfield><subfield code="t">Document gathering --</subfield><subfield code="t">Metagoofil --</subfield><subfield code="t">DNS information --</subfield><subfield code="t">dnswalk --</subfield><subfield code="t">dnsenum --</subfield><subfield code="t">dnsmap --</subfield><subfield code="t">dnsmap-bulk --</subfield><subfield code="t">dnsrecon --</subfield><subfield code="t">fierce --</subfield><subfield code="t">Route information --</subfield><subfield code="g">0.</subfield><subfield code="t">trace --</subfield><subfield code="t">dmitry --</subfield><subfield code="t">itrace --</subfield><subfield code="t">tcpraceroute --</subfield><subfield code="t">tctrace --</subfield><subfield code="t">Utilizing search engines --</subfield><subfield code="t">goorecon --</subfield><subfield code="t">theharvester.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Linux.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n94087892</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Linux.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="x">Testing.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="x">Testing</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Heriyanto, Tedi.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">BackTrack 4 (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCYCWv6cPgX3fkmBpjmFKbd</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Ali, Shakeel.</subfield><subfield code="t">BackTrack 4.</subfield><subfield code="d">Birmingham, UK : Packt, ©2011</subfield><subfield code="z">9781849513944</subfield><subfield code="w">(OCoLC)728008053</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Community experience distilled.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2011030603</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365677</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">365677</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">5559393</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-ocn780165941 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:18:17Z |
institution | BVB |
isbn | 9781849513951 1849513953 |
language | English |
oclc_num | 780165941 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (vii, 371 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Packt, |
record_format | marc |
series | Community experience distilled. |
series2 | Community experience distilled |
spelling | Ali, Shakeel. BackTrack 4 : assuring security by penetration testing / Shakeel Ali, Tedi Heriyanto. BackTrack four Back Track 4 Assuring security by penetration testing Birmingham, UK : Packt, ©2011. 1 online resource (vii, 371 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Community experience distilled Print version record. Includes bibliographical references and index. Annotation BackTrack is a penetration testing and security auditing platform with advanced tools to identify, detect, and exploit any vulnerabilities uncovered in the target network environment. Applying appropriate testing methodology with defined business objectives and a scheduled test plan will result in robust penetration testing of your network.<br /><br />BackTrack 4: Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating the cutting-edge hacker tools and techniques in a coherent step-by-step strategy. It offers all the essential lab preparation and testing procedures to reflect real-world attack scenarios from your business perspective in today's digital age.<br /><br />The authors' experience and expertise enables them to reveal the industry's best approach for logical and systematic penetration testing.<br /><br />The first and so far only book on BackTrack OS starts with lab preparation and testing procedures, explaining the basic installation and configuration set up, discussing types of penetration testing (black-box and white-box), uncovering open security testing methodologies, and proposing the BackTrack specific testing process. The authors discuss a number of security assessment tools necessary to conduct penetration testing in their respective categories (target scoping, information gathering, discovery, enumeration, vulnerability mapping, social engineering, exploitation, privilege escalation, maintaining access, and reporting), following the formal testing methodology. Each of these tools is illustrated with real-world examples to highlight their practical usage and proven configuration techniques. The authors also provide extra weaponry treasures and cite key resources that may be crucial to any professional penetration tester.<br /><br />This book serves as a single professional, practical, and expert guide to developing hardcore penetration testing skills from scratch. You will be trained to make the best use of BackTrack OS either in a commercial environment or an experimental test bed.<br /><br />A tactical example-driven guide for mastering the penetration testing skills with BackTrack to identify, detect, and exploit vulnerabilities at your digital doorstep. All-in-one intelligence gatheringMaltego -- Documenting the information -- Dradis -- Summary -- 5. Target Discovery -- Introduction -- Identifying the target machine -- ping -- arping -- arping -- 2. -- fping -- genlist -- hping -- 2. -- hping -- 3. -- lanmap -- nbtscan -- nping -- onesixtyone -- OS fingerprinting -- p -- 0. f -- xprobe -- 2. -- Summary -- 6. Enumerating Target -- Port scanning -- AutoScan -- Netifera -- Nmap -- Nmap target specification -- Nmap TCP scan options -- Nmap UDP scan options -- Nmap port specification -- Nmap output options -- Nmap timing options -- Nmap scripting engine -- Unicornscan -- Zenmap -- Service enumeration -- Amap -- Httprint -- Httsquash. BackTrack 4: Assuring Security by Penetration Testing -- BackTrack 4: Assuring Security by Penetration Testing -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe -- Free Access for Packt account holders -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Errata -- Piracy -- Questions -- I. Lab Preparation and Testing Procedures -- 1. Beginning with BackTrack -- History -- BackTrack purpose -- Getting BackTrack -- Using BackTrack -- Live DVD. Installing to hard diskInstallation in real machine -- Installation in VirtualBox -- Portable BackTrack -- Configuring network connection -- Ethernet setup -- Wireless setup -- Starting the network service -- Updating BackTrack -- Updating software applications -- Updating the kernel -- Installing additional weapons -- Nessus vulnerability scanner -- WebSecurify -- Customizing BackTrack -- Summary -- 2. Penetration Testing Methodology -- Types of penetration testing -- Black-box testing -- White-box testing -- Vulnerability assessment versus penetration testing -- Security testing methodologies. Open Source Security Testing Methodology Manual (OSSTMM)Key features and benefits -- Information Systems Security Assessment Framework (ISSAF) -- Key features and benefits -- Open Web Application Security Project (OWASP) Top Ten -- Key features and benefits -- Web Application Security Consortium Threat Classification (WASC-TC) -- Key features and benefits -- BackTrack testing methodology -- Target scoping -- Information gathering -- Target discovery -- Enumerating target -- Vulnerability mapping -- Social engineering -- Target exploitation -- Privilege escalation -- Maintaining access -- Documentation and reporting. The ethicsSummary -- II. Penetration Testers Armory -- 3. Target Scoping -- Gathering client requirements -- Customer requirements form -- Deliverables assessment form -- Preparing the test plan -- Test plan checklist -- Profiling test boundaries -- Defining business objectives -- Project management and scheduling -- Summary -- 4. Information Gathering -- Public resources -- Document gathering -- Metagoofil -- DNS information -- dnswalk -- dnsenum -- dnsmap -- dnsmap-bulk -- dnsrecon -- fierce -- Route information -- 0. trace -- dmitry -- itrace -- tcpraceroute -- tctrace -- Utilizing search engines -- goorecon -- theharvester. Linux. http://id.loc.gov/authorities/names/n94087892 Linux. blmlsh Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computers Access control Testing. Tests d'intrusion. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Computers Access control Testing fast Penetration testing (Computer security) fast Heriyanto, Tedi. has work: BackTrack 4 (Text) https://id.oclc.org/worldcat/entity/E39PCYCWv6cPgX3fkmBpjmFKbd https://id.oclc.org/worldcat/ontology/hasWork Print version: Ali, Shakeel. BackTrack 4. Birmingham, UK : Packt, ©2011 9781849513944 (OCoLC)728008053 Community experience distilled. http://id.loc.gov/authorities/names/no2011030603 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365677 Volltext |
spellingShingle | Ali, Shakeel BackTrack 4 : assuring security by penetration testing / Community experience distilled. All-in-one intelligence gatheringMaltego -- Documenting the information -- Dradis -- Summary -- Target Discovery -- Introduction -- Identifying the target machine -- ping -- arping -- fping -- genlist -- hping -- lanmap -- nbtscan -- nping -- onesixtyone -- OS fingerprinting -- p -- f -- xprobe -- Enumerating Target -- Port scanning -- AutoScan -- Netifera -- Nmap -- Nmap target specification -- Nmap TCP scan options -- Nmap UDP scan options -- Nmap port specification -- Nmap output options -- Nmap timing options -- Nmap scripting engine -- Unicornscan -- Zenmap -- Service enumeration -- Amap -- Httprint -- Httsquash. BackTrack 4: Assuring Security by Penetration Testing -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe -- Free Access for Packt account holders -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Errata -- Piracy -- Questions -- I. Lab Preparation and Testing Procedures -- Beginning with BackTrack -- History -- BackTrack purpose -- Getting BackTrack -- Using BackTrack -- Live DVD. Installing to hard diskInstallation in real machine -- Installation in VirtualBox -- Portable BackTrack -- Configuring network connection -- Ethernet setup -- Wireless setup -- Starting the network service -- Updating BackTrack -- Updating software applications -- Updating the kernel -- Installing additional weapons -- Nessus vulnerability scanner -- WebSecurify -- Customizing BackTrack -- Penetration Testing Methodology -- Types of penetration testing -- Black-box testing -- White-box testing -- Vulnerability assessment versus penetration testing -- Security testing methodologies. Open Source Security Testing Methodology Manual (OSSTMM)Key features and benefits -- Information Systems Security Assessment Framework (ISSAF) -- Key features and benefits -- Open Web Application Security Project (OWASP) Top Ten -- Web Application Security Consortium Threat Classification (WASC-TC) -- BackTrack testing methodology -- Target scoping -- Information gathering -- Target discovery -- Enumerating target -- Vulnerability mapping -- Social engineering -- Target exploitation -- Privilege escalation -- Maintaining access -- Documentation and reporting. The ethicsSummary -- II. Penetration Testers Armory -- Target Scoping -- Gathering client requirements -- Customer requirements form -- Deliverables assessment form -- Preparing the test plan -- Test plan checklist -- Profiling test boundaries -- Defining business objectives -- Project management and scheduling -- Information Gathering -- Public resources -- Document gathering -- Metagoofil -- DNS information -- dnswalk -- dnsenum -- dnsmap -- dnsmap-bulk -- dnsrecon -- fierce -- Route information -- trace -- dmitry -- itrace -- tcpraceroute -- tctrace -- Utilizing search engines -- goorecon -- theharvester. Linux. http://id.loc.gov/authorities/names/n94087892 Linux. blmlsh Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computers Access control Testing. Tests d'intrusion. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Computers Access control Testing fast Penetration testing (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/names/n94087892 http://id.loc.gov/authorities/subjects/sh2011003137 http://id.loc.gov/authorities/subjects/sh90001862 |
title | BackTrack 4 : assuring security by penetration testing / |
title_alt | BackTrack four Back Track 4 Assuring security by penetration testing All-in-one intelligence gatheringMaltego -- Documenting the information -- Dradis -- Summary -- Target Discovery -- Introduction -- Identifying the target machine -- ping -- arping -- fping -- genlist -- hping -- lanmap -- nbtscan -- nping -- onesixtyone -- OS fingerprinting -- p -- f -- xprobe -- Enumerating Target -- Port scanning -- AutoScan -- Netifera -- Nmap -- Nmap target specification -- Nmap TCP scan options -- Nmap UDP scan options -- Nmap port specification -- Nmap output options -- Nmap timing options -- Nmap scripting engine -- Unicornscan -- Zenmap -- Service enumeration -- Amap -- Httprint -- Httsquash. BackTrack 4: Assuring Security by Penetration Testing -- Credits -- About the Authors -- About the Reviewers -- www.PacktPub.com -- Support files, eBooks, discount offers and more -- Why Subscribe -- Free Access for Packt account holders -- What this book covers -- What you need for this book -- Who this book is for -- Conventions -- Reader feedback -- Customer support -- Errata -- Piracy -- Questions -- I. Lab Preparation and Testing Procedures -- Beginning with BackTrack -- History -- BackTrack purpose -- Getting BackTrack -- Using BackTrack -- Live DVD. Installing to hard diskInstallation in real machine -- Installation in VirtualBox -- Portable BackTrack -- Configuring network connection -- Ethernet setup -- Wireless setup -- Starting the network service -- Updating BackTrack -- Updating software applications -- Updating the kernel -- Installing additional weapons -- Nessus vulnerability scanner -- WebSecurify -- Customizing BackTrack -- Penetration Testing Methodology -- Types of penetration testing -- Black-box testing -- White-box testing -- Vulnerability assessment versus penetration testing -- Security testing methodologies. Open Source Security Testing Methodology Manual (OSSTMM)Key features and benefits -- Information Systems Security Assessment Framework (ISSAF) -- Key features and benefits -- Open Web Application Security Project (OWASP) Top Ten -- Web Application Security Consortium Threat Classification (WASC-TC) -- BackTrack testing methodology -- Target scoping -- Information gathering -- Target discovery -- Enumerating target -- Vulnerability mapping -- Social engineering -- Target exploitation -- Privilege escalation -- Maintaining access -- Documentation and reporting. The ethicsSummary -- II. Penetration Testers Armory -- Target Scoping -- Gathering client requirements -- Customer requirements form -- Deliverables assessment form -- Preparing the test plan -- Test plan checklist -- Profiling test boundaries -- Defining business objectives -- Project management and scheduling -- Information Gathering -- Public resources -- Document gathering -- Metagoofil -- DNS information -- dnswalk -- dnsenum -- dnsmap -- dnsmap-bulk -- dnsrecon -- fierce -- Route information -- trace -- dmitry -- itrace -- tcpraceroute -- tctrace -- Utilizing search engines -- goorecon -- theharvester. |
title_auth | BackTrack 4 : assuring security by penetration testing / |
title_exact_search | BackTrack 4 : assuring security by penetration testing / |
title_full | BackTrack 4 : assuring security by penetration testing / Shakeel Ali, Tedi Heriyanto. |
title_fullStr | BackTrack 4 : assuring security by penetration testing / Shakeel Ali, Tedi Heriyanto. |
title_full_unstemmed | BackTrack 4 : assuring security by penetration testing / Shakeel Ali, Tedi Heriyanto. |
title_short | BackTrack 4 : |
title_sort | backtrack 4 assuring security by penetration testing |
title_sub | assuring security by penetration testing / |
topic | Linux. http://id.loc.gov/authorities/names/n94087892 Linux. blmlsh Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computers Access control Testing. Tests d'intrusion. Sécurité informatique. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer security fast Computers Access control Testing fast Penetration testing (Computer security) fast |
topic_facet | Linux. Linux Penetration testing (Computer security) Computer security. Computers Access control Testing. Tests d'intrusion. Sécurité informatique. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer security Computers Access control Testing |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=365677 |
work_keys_str_mv | AT alishakeel backtrack4assuringsecuritybypenetrationtesting AT heriyantotedi backtrack4assuringsecuritybypenetrationtesting AT alishakeel backtrackfour AT heriyantotedi backtrackfour AT alishakeel backtrack4 AT heriyantotedi backtrack4 AT alishakeel assuringsecuritybypenetrationtesting AT heriyantotedi assuringsecuritybypenetrationtesting |