Hacking with Kali :: practical penetration testing techniques /
This book provides detailed explanations of the complete Linux penetration testing lifecycle, complete linkage of the Kali information, resources and distribution downloads, and hands-on exercises that reinforce the topics discussed.
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Boston :
Syngress,
2014.
|
Ausgabe: | 1st ed. |
Schlagworte: | |
Online-Zugang: | Volltext Volltext |
Zusammenfassung: | This book provides detailed explanations of the complete Linux penetration testing lifecycle, complete linkage of the Kali information, resources and distribution downloads, and hands-on exercises that reinforce the topics discussed. |
Beschreibung: | 1 online resource (ix, 227 pages) : illustrations |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780124078833 0124078834 1306195705 9781306195706 |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn870340083 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 140212s2014 maua ob 001 0 eng d | ||
010 | |a 2013045051 | ||
040 | |a UMI |b eng |e pn |c UMI |d UKMGB |d OCLCO |d N$T |d COO |d DEBBG |d GGVRL |d B24X7 |d DEBSZ |d EBLCP |d OPELS |d YDXCP |d UPM |d OCLCF |d OCLCQ |d OCLCO |d OCLCQ |d TEFOD |d IDEBK |d OCLCQ |d ICA |d AGLDB |d K6U |d PIFAG |d FVL |d ZCU |d LIV |d MERUC |d OCLCQ |d OCLCO |d U3W |d D6H |d STF |d OCLCQ |d VTS |d CEF |d ICG |d INT |d VT2 |d AU@ |d OCLCQ |d OCLCO |d WYU |d G3B |d TKN |d OCLCQ |d OCLCO |d DKC |d OCLCQ |d OCLCO |d VLY |d QGK |d OCLCO |d OCLCQ |d OCLCO |d OCLCL |d OCLCQ |d SXB | ||
016 | 7 | |a 016521889 |2 Uk | |
019 | |a 861361399 |a 865329755 |a 865657695 |a 966386091 |a 1055384313 |a 1066041817 |a 1081235256 |a 1103273524 |a 1129353704 |a 1153048538 |a 1162573706 |a 1192347651 |a 1228592080 |a 1240510199 |a 1241924723 |a 1295610595 |a 1300553039 | ||
020 | |a 9780124078833 |q (electronic bk.) | ||
020 | |a 0124078834 |q (electronic bk.) | ||
020 | |a 1306195705 |q (ebk) | ||
020 | |a 9781306195706 |q (ebk) | ||
020 | |z 0124077498 | ||
020 | |z 9780124077492 | ||
035 | |a (OCoLC)870340083 |z (OCoLC)861361399 |z (OCoLC)865329755 |z (OCoLC)865657695 |z (OCoLC)966386091 |z (OCoLC)1055384313 |z (OCoLC)1066041817 |z (OCoLC)1081235256 |z (OCoLC)1103273524 |z (OCoLC)1129353704 |z (OCoLC)1153048538 |z (OCoLC)1162573706 |z (OCoLC)1192347651 |z (OCoLC)1228592080 |z (OCoLC)1240510199 |z (OCoLC)1241924723 |z (OCoLC)1295610595 |z (OCoLC)1300553039 | ||
037 | |a B1146DE5-6722-4950-9407-739B7A8FA1FF |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 060040 |2 bisacsh | |
072 | 7 | |a COM |x 043050 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Broad, James. | |
245 | 1 | 0 | |a Hacking with Kali : |b practical penetration testing techniques / |c James Broad, Andrew Bindner. |
250 | |a 1st ed. | ||
260 | |a Amsterdam ; |a Boston : |b Syngress, |c 2014. | ||
300 | |a 1 online resource (ix, 227 pages) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file | ||
588 | 0 | |a Print version record. | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Introduction -- Download and install Kali Linux -- Software, patches, and upgrades -- Configuring Kali Linux -- Building a penetration testing lab -- Introduction to the penetration test -- Reconnaissance -- Scanning -- Exploitation -- Maintaining access -- Reports and templates -- Appendix A: Tribal Chicken -- Appendix B: Kali penetration testing tools. | |
520 | |a This book provides detailed explanations of the complete Linux penetration testing lifecycle, complete linkage of the Kali information, resources and distribution downloads, and hands-on exercises that reinforce the topics discussed. | ||
546 | |a English. | ||
630 | 0 | 0 | |a Kali Linux. |0 http://id.loc.gov/authorities/names/n2014001932 |
630 | 0 | 7 | |a Kali Linux. |2 blmlsh |
630 | 0 | 7 | |a Kali Linux |2 fast |
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 0 | |a Computer networks |x Security measures. |0 http://id.loc.gov/authorities/subjects/sh94001277 | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Réseaux d'ordinateurs |x Sécurité |x Mesures. | |
650 | 7 | |a COMPUTERS |x Internet |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Networking |x Security. |2 bisacsh | |
650 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh | |
650 | 7 | |a Computer networks |x Security measures |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
655 | 0 | |a Electronic book. | |
655 | 4 | |a Electronic books. | |
700 | 1 | |a Bindner, Andrew. | |
758 | |i has work: |a Hacking with Kali (Text) |1 https://id.oclc.org/worldcat/entity/E39PCG9yq4B4cDT6GFH73Q4Yrq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Broad, James. |t Hacking with Kali. |b 1st ed. |d Waltham, MA : Syngress, 2014 |z 9780124078833 |w (OCoLC)853505666 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://www.sciencedirect.com/science/book/9780124077492 |3 Volltext |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=516105 |3 Volltext |
938 | |a Books 24x7 |b B247 |n bks00058866 | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL1115177 | ||
938 | |a EBSCOhost |b EBSC |n 516105 | ||
938 | |a Cengage Learning |b GVRL |n GVRL6ZMY | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis26997466 | ||
938 | |a YBP Library Services |b YANK |n 11421836 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn870340083 |
---|---|
_version_ | 1816882260703444992 |
adam_text | |
any_adam_object | |
author | Broad, James |
author2 | Bindner, Andrew |
author2_role | |
author2_variant | a b ab |
author_facet | Broad, James Bindner, Andrew |
author_role | |
author_sort | Broad, James |
author_variant | j b jb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Introduction -- Download and install Kali Linux -- Software, patches, and upgrades -- Configuring Kali Linux -- Building a penetration testing lab -- Introduction to the penetration test -- Reconnaissance -- Scanning -- Exploitation -- Maintaining access -- Reports and templates -- Appendix A: Tribal Chicken -- Appendix B: Kali penetration testing tools. |
ctrlnum | (OCoLC)870340083 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 1st ed. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04577cam a2200793 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn870340083</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">140212s2014 maua ob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="a"> 2013045051</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">COO</subfield><subfield code="d">DEBBG</subfield><subfield code="d">GGVRL</subfield><subfield code="d">B24X7</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OPELS</subfield><subfield code="d">YDXCP</subfield><subfield code="d">UPM</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">TEFOD</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ICA</subfield><subfield code="d">AGLDB</subfield><subfield code="d">K6U</subfield><subfield code="d">PIFAG</subfield><subfield code="d">FVL</subfield><subfield code="d">ZCU</subfield><subfield code="d">LIV</subfield><subfield code="d">MERUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">U3W</subfield><subfield code="d">D6H</subfield><subfield code="d">STF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">CEF</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">AU@</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">WYU</subfield><subfield code="d">G3B</subfield><subfield code="d">TKN</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">VLY</subfield><subfield code="d">QGK</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SXB</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">016521889</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">861361399</subfield><subfield code="a">865329755</subfield><subfield code="a">865657695</subfield><subfield code="a">966386091</subfield><subfield code="a">1055384313</subfield><subfield code="a">1066041817</subfield><subfield code="a">1081235256</subfield><subfield code="a">1103273524</subfield><subfield code="a">1129353704</subfield><subfield code="a">1153048538</subfield><subfield code="a">1162573706</subfield><subfield code="a">1192347651</subfield><subfield code="a">1228592080</subfield><subfield code="a">1240510199</subfield><subfield code="a">1241924723</subfield><subfield code="a">1295610595</subfield><subfield code="a">1300553039</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780124078833</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0124078834</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1306195705</subfield><subfield code="q">(ebk)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781306195706</subfield><subfield code="q">(ebk)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0124077498</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780124077492</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)870340083</subfield><subfield code="z">(OCoLC)861361399</subfield><subfield code="z">(OCoLC)865329755</subfield><subfield code="z">(OCoLC)865657695</subfield><subfield code="z">(OCoLC)966386091</subfield><subfield code="z">(OCoLC)1055384313</subfield><subfield code="z">(OCoLC)1066041817</subfield><subfield code="z">(OCoLC)1081235256</subfield><subfield code="z">(OCoLC)1103273524</subfield><subfield code="z">(OCoLC)1129353704</subfield><subfield code="z">(OCoLC)1153048538</subfield><subfield code="z">(OCoLC)1162573706</subfield><subfield code="z">(OCoLC)1192347651</subfield><subfield code="z">(OCoLC)1228592080</subfield><subfield code="z">(OCoLC)1240510199</subfield><subfield code="z">(OCoLC)1241924723</subfield><subfield code="z">(OCoLC)1295610595</subfield><subfield code="z">(OCoLC)1300553039</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">B1146DE5-6722-4950-9407-739B7A8FA1FF</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">060040</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">043050</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Broad, James.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hacking with Kali :</subfield><subfield code="b">practical penetration testing techniques /</subfield><subfield code="c">James Broad, Andrew Bindner.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Boston :</subfield><subfield code="b">Syngress,</subfield><subfield code="c">2014.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (ix, 227 pages) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Introduction -- Download and install Kali Linux -- Software, patches, and upgrades -- Configuring Kali Linux -- Building a penetration testing lab -- Introduction to the penetration test -- Reconnaissance -- Scanning -- Exploitation -- Maintaining access -- Reports and templates -- Appendix A: Tribal Chicken -- Appendix B: Kali penetration testing tools.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book provides detailed explanations of the complete Linux penetration testing lifecycle, complete linkage of the Kali information, resources and distribution downloads, and hands-on exercises that reinforce the topics discussed.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">English.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Kali Linux.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2014001932</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Kali Linux.</subfield><subfield code="2">blmlsh</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh94001277</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Réseaux d'ordinateurs</subfield><subfield code="x">Sécurité</subfield><subfield code="x">Mesures.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Internet</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Networking</subfield><subfield code="x">Security.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="0"><subfield code="a">Electronic book.</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bindner, Andrew.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Hacking with Kali (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCG9yq4B4cDT6GFH73Q4Yrq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Broad, James.</subfield><subfield code="t">Hacking with Kali.</subfield><subfield code="b">1st ed.</subfield><subfield code="d">Waltham, MA : Syngress, 2014</subfield><subfield code="z">9780124078833</subfield><subfield code="w">(OCoLC)853505666</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://www.sciencedirect.com/science/book/9780124077492</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=516105</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Books 24x7</subfield><subfield code="b">B247</subfield><subfield code="n">bks00058866</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL1115177</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">516105</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Cengage Learning</subfield><subfield code="b">GVRL</subfield><subfield code="n">GVRL6ZMY</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis26997466</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">11421836</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic book. Electronic books. |
genre_facet | Electronic book. Electronic books. |
id | ZDB-4-EBA-ocn870340083 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:25:47Z |
institution | BVB |
isbn | 9780124078833 0124078834 1306195705 9781306195706 |
language | English |
lccn | 2013045051 |
oclc_num | 870340083 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (ix, 227 pages) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Syngress, |
record_format | marc |
spelling | Broad, James. Hacking with Kali : practical penetration testing techniques / James Broad, Andrew Bindner. 1st ed. Amsterdam ; Boston : Syngress, 2014. 1 online resource (ix, 227 pages) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier text file Print version record. Includes bibliographical references and index. Introduction -- Download and install Kali Linux -- Software, patches, and upgrades -- Configuring Kali Linux -- Building a penetration testing lab -- Introduction to the penetration test -- Reconnaissance -- Scanning -- Exploitation -- Maintaining access -- Reports and templates -- Appendix A: Tribal Chicken -- Appendix B: Kali penetration testing tools. This book provides detailed explanations of the complete Linux penetration testing lifecycle, complete linkage of the Kali information, resources and distribution downloads, and hands-on exercises that reinforce the topics discussed. English. Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux. blmlsh Kali Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Tests d'intrusion. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Penetration testing (Computer security) fast Electronic book. Electronic books. Bindner, Andrew. has work: Hacking with Kali (Text) https://id.oclc.org/worldcat/entity/E39PCG9yq4B4cDT6GFH73Q4Yrq https://id.oclc.org/worldcat/ontology/hasWork Print version: Broad, James. Hacking with Kali. 1st ed. Waltham, MA : Syngress, 2014 9780124078833 (OCoLC)853505666 FWS01 ZDB-4-EBA FWS_PDA_EBA https://www.sciencedirect.com/science/book/9780124077492 Volltext FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=516105 Volltext |
spellingShingle | Broad, James Hacking with Kali : practical penetration testing techniques / Introduction -- Download and install Kali Linux -- Software, patches, and upgrades -- Configuring Kali Linux -- Building a penetration testing lab -- Introduction to the penetration test -- Reconnaissance -- Scanning -- Exploitation -- Maintaining access -- Reports and templates -- Appendix A: Tribal Chicken -- Appendix B: Kali penetration testing tools. Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux. blmlsh Kali Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Tests d'intrusion. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Penetration testing (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/names/n2014001932 http://id.loc.gov/authorities/subjects/sh2011003137 http://id.loc.gov/authorities/subjects/sh94001277 |
title | Hacking with Kali : practical penetration testing techniques / |
title_auth | Hacking with Kali : practical penetration testing techniques / |
title_exact_search | Hacking with Kali : practical penetration testing techniques / |
title_full | Hacking with Kali : practical penetration testing techniques / James Broad, Andrew Bindner. |
title_fullStr | Hacking with Kali : practical penetration testing techniques / James Broad, Andrew Bindner. |
title_full_unstemmed | Hacking with Kali : practical penetration testing techniques / James Broad, Andrew Bindner. |
title_short | Hacking with Kali : |
title_sort | hacking with kali practical penetration testing techniques |
title_sub | practical penetration testing techniques / |
topic | Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux. blmlsh Kali Linux fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer networks Security measures. http://id.loc.gov/authorities/subjects/sh94001277 Tests d'intrusion. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. bisacsh COMPUTERS Networking Security. bisacsh COMPUTERS Security General. bisacsh Computer networks Security measures fast Penetration testing (Computer security) fast |
topic_facet | Kali Linux. Kali Linux Penetration testing (Computer security) Computer networks Security measures. Tests d'intrusion. Réseaux d'ordinateurs Sécurité Mesures. COMPUTERS Internet Security. COMPUTERS Networking Security. COMPUTERS Security General. Computer networks Security measures Electronic book. Electronic books. |
url | https://www.sciencedirect.com/science/book/9780124077492 https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=516105 |
work_keys_str_mv | AT broadjames hackingwithkalipracticalpenetrationtestingtechniques AT bindnerandrew hackingwithkalipracticalpenetrationtestingtechniques |