The Complete Metasploit Guide :: Explore Effective Penetration Testing Techniques with Metasploit.
This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perf...
Gespeichert in:
1. Verfasser: | |
---|---|
Weitere Verfasser: | |
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing, Limited,
2019.
|
Schriftenreihe: | Learning path.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure ... |
Beschreibung: | 1 online resource (651 pages) |
Bibliographie: | Includes bibliographical references. |
ISBN: | 1838826904 9781838826901 |
Internformat
MARC
LEADER | 00000cam a2200000Ma 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1108551773 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 190713s2019 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d TEFOD |d EBLCP |d TEFOD |d OCLCF |d OCLCQ |d UKAHL |d YDX |d UKMGB |d OCLCQ |d N$T |d OCLCO |d K6U |d OCLCQ |d OCLCO |d OCLCL |d TMA |d OCLCQ |d SXB |d UMI |d FUT |d OCLCO | ||
015 | |a GBB9E1185 |2 bnb | ||
016 | 7 | |a 019459159 |2 Uk | |
019 | |a 1106370073 |a 1226345286 | ||
020 | |a 1838826904 | ||
020 | |a 9781838826901 |q (electronic bk.) | ||
020 | |z 9781838822477 | ||
020 | |z 183882247X | ||
035 | |a (OCoLC)1108551773 |z (OCoLC)1106370073 |z (OCoLC)1226345286 | ||
037 | |a 09F96B14-96CA-4570-9F97-C3A2567D19DD |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Rahalkar, Sagar. | |
245 | 1 | 4 | |a The Complete Metasploit Guide : |b Explore Effective Penetration Testing Techniques with Metasploit. |
260 | |a Birmingham : |b Packt Publishing, Limited, |c 2019. | ||
300 | |a 1 online resource (651 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a Learning path | |
588 | 0 | |a Print version record. | |
520 | |a This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure ... | ||
504 | |a Includes bibliographical references. | ||
630 | 0 | 0 | |a Metasploit (Electronic resource) |0 http://id.loc.gov/authorities/names/n2011043654 |
630 | 0 | 7 | |a Metasploit (Electronic resource) |2 fast |
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Tests d'intrusion. | |
650 | 6 | |a Sécurité informatique. | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
655 | 4 | |a Electronic book. | |
700 | 1 | |a Jaswal, Nipun. | |
758 | |i has work: |a The complete Metasploit guide (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGPmGtbdphDYcXjkbXJdgq |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Rahalkar, Sagar. |t Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit. |d Birmingham : Packt Publishing, Limited, ©2019 |z 9781838822477 |
830 | 0 | |a Learning path. |0 http://id.loc.gov/authorities/names/no2018038408 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2177837 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH36438661 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL5802136 | ||
938 | |a YBP Library Services |b YANK |n 300663855 | ||
938 | |a EBSCOhost |b EBSC |n 2177837 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1108551773 |
---|---|
_version_ | 1816882496233537536 |
adam_text | |
any_adam_object | |
author | Rahalkar, Sagar |
author2 | Jaswal, Nipun |
author2_role | |
author2_variant | n j nj |
author_facet | Rahalkar, Sagar Jaswal, Nipun |
author_role | |
author_sort | Rahalkar, Sagar |
author_variant | s r sr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)1108551773 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03152cam a2200613Ma 4500</leader><controlfield tag="001">ZDB-4-EBA-on1108551773</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">190713s2019 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">TEFOD</subfield><subfield code="d">EBLCP</subfield><subfield code="d">TEFOD</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKAHL</subfield><subfield code="d">YDX</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCO</subfield><subfield code="d">K6U</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SXB</subfield><subfield code="d">UMI</subfield><subfield code="d">FUT</subfield><subfield code="d">OCLCO</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBB9E1185</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">019459159</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1106370073</subfield><subfield code="a">1226345286</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1838826904</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838826901</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781838822477</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">183882247X</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1108551773</subfield><subfield code="z">(OCoLC)1106370073</subfield><subfield code="z">(OCoLC)1226345286</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">09F96B14-96CA-4570-9F97-C3A2567D19DD</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rahalkar, Sagar.</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The Complete Metasploit Guide :</subfield><subfield code="b">Explore Effective Penetration Testing Techniques with Metasploit.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing, Limited,</subfield><subfield code="c">2019.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (651 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Learning path</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure ...</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Metasploit (Electronic resource)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2011043654</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Metasploit (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic book.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jaswal, Nipun.</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The complete Metasploit guide (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGPmGtbdphDYcXjkbXJdgq</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Rahalkar, Sagar.</subfield><subfield code="t">Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit.</subfield><subfield code="d">Birmingham : Packt Publishing, Limited, ©2019</subfield><subfield code="z">9781838822477</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Learning path.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2018038408</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2177837</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH36438661</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5802136</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">300663855</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2177837</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
genre | Electronic book. |
genre_facet | Electronic book. |
id | ZDB-4-EBA-on1108551773 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:32Z |
institution | BVB |
isbn | 1838826904 9781838826901 |
language | English |
oclc_num | 1108551773 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (651 pages) |
psigel | ZDB-4-EBA |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt Publishing, Limited, |
record_format | marc |
series | Learning path. |
series2 | Learning path |
spelling | Rahalkar, Sagar. The Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit. Birmingham : Packt Publishing, Limited, 2019. 1 online resource (651 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Learning path Print version record. This Learning Path is your one-stop solution to learn everything that is required to validate your complex system with penetration testing. Starting with the architecture of the Metasploit framework, this Learning Path shows how to leverage the many features and functionalities of Metasploit to perform thorough penetration testing and secure ... Includes bibliographical references. Metasploit (Electronic resource) http://id.loc.gov/authorities/names/n2011043654 Metasploit (Electronic resource) fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer Security https://id.nlm.nih.gov/mesh/D016494 Tests d'intrusion. Sécurité informatique. Penetration testing (Computer security) fast Electronic book. Jaswal, Nipun. has work: The complete Metasploit guide (Text) https://id.oclc.org/worldcat/entity/E39PCGPmGtbdphDYcXjkbXJdgq https://id.oclc.org/worldcat/ontology/hasWork Print version: Rahalkar, Sagar. Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit. Birmingham : Packt Publishing, Limited, ©2019 9781838822477 Learning path. http://id.loc.gov/authorities/names/no2018038408 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2177837 Volltext |
spellingShingle | Rahalkar, Sagar The Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit. Learning path. Metasploit (Electronic resource) http://id.loc.gov/authorities/names/n2011043654 Metasploit (Electronic resource) fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer Security https://id.nlm.nih.gov/mesh/D016494 Tests d'intrusion. Sécurité informatique. Penetration testing (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/names/n2011043654 http://id.loc.gov/authorities/subjects/sh2011003137 http://id.loc.gov/authorities/subjects/sh90001862 https://id.nlm.nih.gov/mesh/D016494 |
title | The Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit. |
title_auth | The Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit. |
title_exact_search | The Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit. |
title_full | The Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit. |
title_fullStr | The Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit. |
title_full_unstemmed | The Complete Metasploit Guide : Explore Effective Penetration Testing Techniques with Metasploit. |
title_short | The Complete Metasploit Guide : |
title_sort | complete metasploit guide explore effective penetration testing techniques with metasploit |
title_sub | Explore Effective Penetration Testing Techniques with Metasploit. |
topic | Metasploit (Electronic resource) http://id.loc.gov/authorities/names/n2011043654 Metasploit (Electronic resource) fast Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer Security https://id.nlm.nih.gov/mesh/D016494 Tests d'intrusion. Sécurité informatique. Penetration testing (Computer security) fast |
topic_facet | Metasploit (Electronic resource) Penetration testing (Computer security) Computer security. Computer Security Tests d'intrusion. Sécurité informatique. Electronic book. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2177837 |
work_keys_str_mv | AT rahalkarsagar thecompletemetasploitguideexploreeffectivepenetrationtestingtechniqueswithmetasploit AT jaswalnipun thecompletemetasploitguideexploreeffectivepenetrationtestingtechniqueswithmetasploit AT rahalkarsagar completemetasploitguideexploreeffectivepenetrationtestingtechniqueswithmetasploit AT jaswalnipun completemetasploitguideexploreeffectivepenetrationtestingtechniqueswithmetasploit |