Learn Kali Linux 2019 :: Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark.
The current trend of various hacking and security breaches displays how important it has become to pentest your environment, to ensure end point protection. This book will take you through the latest version of Kali Linux to efficiently deal with various crucial security aspects such as confidential...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham :
Packt Publishing, Limited,
2019.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | The current trend of various hacking and security breaches displays how important it has become to pentest your environment, to ensure end point protection. This book will take you through the latest version of Kali Linux to efficiently deal with various crucial security aspects such as confidentiality, integrity, access control and authentication. |
Beschreibung: | 1 online resource (536 pages) |
ISBN: | 1789612624 9781789612622 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1128449047 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cnu---unuuu | ||
008 | 191214s2019 enk o 000 0 eng d | ||
040 | |a EBLCP |b eng |e pn |c EBLCP |d UKAHL |d TEFOD |d N$T |d OCLCF |d OCLCQ |d ESU |d NLW |d OCLCO |d OCLCQ |d NZAUC |d OCLCQ |d OCLCO |d OCLCL | ||
020 | |a 1789612624 | ||
020 | |a 9781789612622 |q (electronic bk.) | ||
035 | |a (OCoLC)1128449047 | ||
037 | |a 357B3BCF-779B-4ED7-BF55-AEAAC1B4A5E4 |b OverDrive, Inc. |n http://www.overdrive.com | ||
050 | 4 | |a QA76.9.A25 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Singh, Glen D. | |
245 | 1 | 0 | |a Learn Kali Linux 2019 : |b Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark. |
260 | |a Birmingham : |b Packt Publishing, Limited, |c 2019. | ||
300 | |a 1 online resource (536 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Print version record. | |
520 | |a The current trend of various hacking and security breaches displays how important it has become to pentest your environment, to ensure end point protection. This book will take you through the latest version of Kali Linux to efficiently deal with various crucial security aspects such as confidentiality, integrity, access control and authentication. | ||
505 | 0 | |a Learn Kali Linux 2019: perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Kali Linux Basics -- 1: Introduction to Hacking -- 2: Setting Up Kali -- Part 1 -- 3: Setting Up Kali -- Part 2 -- 4: Getting Comfortable with Kali Linux 2019 -- Section 2: Reconnaissance -- 5: Passive Information Gathering -- 6: Active Information Gathering -- Section 3: Vulnerability Assessment and Penetration Testing with Kali Linux 2019 -- 7: Working with Vulnerability Scanners -- 8: Understanding Network Penetration Testing -- 9: Network Penetration Testing -- Pre-Connection Attacks -- 10: Network Penetration Testing -- Gaining Access -- 11: Network Penetration Testing -- Post-Connection Attacks -- 12: Network Penetration Testing -- Detection and Security -- 13: Client-Side Attacks -- Social Engineering -- 14: Performing Website Penetration Testing -- 15: Website Penetration Testing -- Gaining Access -- 16: Best Practices -- Assessments -- Other Books You May Enjoy -- Index. | |
630 | 0 | 0 | |a Kali Linux. |0 http://id.loc.gov/authorities/names/n2014001932 |
630 | 0 | 7 | |a Kali Linux |2 fast |
650 | 7 | |a Linux. |2 bicssc | |
650 | 7 | |a Computer networking & communications. |2 bicssc | |
650 | 7 | |a Computer security. |2 bicssc | |
650 | 7 | |a Computers |x Networking |x General. |2 bisacsh | |
650 | 7 | |a Computers |x Operating Systems |x Linux. |2 bisacsh | |
650 | 7 | |a Computers |x Security |x General. |2 bisacsh | |
758 | |i has work: |a Learn Kali Linux 2019 (Work) |1 https://id.oclc.org/worldcat/entity/E39PCXVBQpJ9cDcCBM7QqTcHG3 |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Singh, Glen D. |t Learn Kali Linux 2019 : Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark. |d Birmingham : Packt Publishing, Limited, ©2019 |z 9781789611809 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2297944 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH36854556 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL5979319 | ||
938 | |a EBSCOhost |b EBSC |n 2297944 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1128449047 |
---|---|
_version_ | 1816882505754607616 |
adam_text | |
any_adam_object | |
author | Singh, Glen D. |
author_facet | Singh, Glen D. |
author_role | |
author_sort | Singh, Glen D. |
author_variant | g d s gd gds |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Learn Kali Linux 2019: perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Kali Linux Basics -- 1: Introduction to Hacking -- 2: Setting Up Kali -- Part 1 -- 3: Setting Up Kali -- Part 2 -- 4: Getting Comfortable with Kali Linux 2019 -- Section 2: Reconnaissance -- 5: Passive Information Gathering -- 6: Active Information Gathering -- Section 3: Vulnerability Assessment and Penetration Testing with Kali Linux 2019 -- 7: Working with Vulnerability Scanners -- 8: Understanding Network Penetration Testing -- 9: Network Penetration Testing -- Pre-Connection Attacks -- 10: Network Penetration Testing -- Gaining Access -- 11: Network Penetration Testing -- Post-Connection Attacks -- 12: Network Penetration Testing -- Detection and Security -- 13: Client-Side Attacks -- Social Engineering -- 14: Performing Website Penetration Testing -- 15: Website Penetration Testing -- Gaining Access -- 16: Best Practices -- Assessments -- Other Books You May Enjoy -- Index. |
ctrlnum | (OCoLC)1128449047 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03645cam a2200493 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1128449047</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cnu---unuuu</controlfield><controlfield tag="008">191214s2019 enk o 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">EBLCP</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">EBLCP</subfield><subfield code="d">UKAHL</subfield><subfield code="d">TEFOD</subfield><subfield code="d">N$T</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ESU</subfield><subfield code="d">NLW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">NZAUC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1789612624</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789612622</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1128449047</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">357B3BCF-779B-4ED7-BF55-AEAAC1B4A5E4</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Singh, Glen D.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learn Kali Linux 2019 :</subfield><subfield code="b">Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Birmingham :</subfield><subfield code="b">Packt Publishing, Limited,</subfield><subfield code="c">2019.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (536 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">The current trend of various hacking and security breaches displays how important it has become to pentest your environment, to ensure end point protection. This book will take you through the latest version of Kali Linux to efficiently deal with various crucial security aspects such as confidentiality, integrity, access control and authentication.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Learn Kali Linux 2019: perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Kali Linux Basics -- 1: Introduction to Hacking -- 2: Setting Up Kali -- Part 1 -- 3: Setting Up Kali -- Part 2 -- 4: Getting Comfortable with Kali Linux 2019 -- Section 2: Reconnaissance -- 5: Passive Information Gathering -- 6: Active Information Gathering -- Section 3: Vulnerability Assessment and Penetration Testing with Kali Linux 2019 -- 7: Working with Vulnerability Scanners -- 8: Understanding Network Penetration Testing -- 9: Network Penetration Testing -- Pre-Connection Attacks -- 10: Network Penetration Testing -- Gaining Access -- 11: Network Penetration Testing -- Post-Connection Attacks -- 12: Network Penetration Testing -- Detection and Security -- 13: Client-Side Attacks -- Social Engineering -- 14: Performing Website Penetration Testing -- 15: Website Penetration Testing -- Gaining Access -- 16: Best Practices -- Assessments -- Other Books You May Enjoy -- Index.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Kali Linux.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2014001932</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Kali Linux</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Linux.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networking & communications.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security.</subfield><subfield code="2">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Networking</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Operating Systems</subfield><subfield code="x">Linux.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computers</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Learn Kali Linux 2019 (Work)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCXVBQpJ9cDcCBM7QqTcHG3</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Singh, Glen D.</subfield><subfield code="t">Learn Kali Linux 2019 : Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark.</subfield><subfield code="d">Birmingham : Packt Publishing, Limited, ©2019</subfield><subfield code="z">9781789611809</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2297944</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH36854556</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL5979319</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2297944</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1128449047 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:41Z |
institution | BVB |
isbn | 1789612624 9781789612622 |
language | English |
oclc_num | 1128449047 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (536 pages) |
psigel | ZDB-4-EBA |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt Publishing, Limited, |
record_format | marc |
spelling | Singh, Glen D. Learn Kali Linux 2019 : Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark. Birmingham : Packt Publishing, Limited, 2019. 1 online resource (536 pages) text txt rdacontent computer c rdamedia online resource cr rdacarrier Print version record. The current trend of various hacking and security breaches displays how important it has become to pentest your environment, to ensure end point protection. This book will take you through the latest version of Kali Linux to efficiently deal with various crucial security aspects such as confidentiality, integrity, access control and authentication. Learn Kali Linux 2019: perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Kali Linux Basics -- 1: Introduction to Hacking -- 2: Setting Up Kali -- Part 1 -- 3: Setting Up Kali -- Part 2 -- 4: Getting Comfortable with Kali Linux 2019 -- Section 2: Reconnaissance -- 5: Passive Information Gathering -- 6: Active Information Gathering -- Section 3: Vulnerability Assessment and Penetration Testing with Kali Linux 2019 -- 7: Working with Vulnerability Scanners -- 8: Understanding Network Penetration Testing -- 9: Network Penetration Testing -- Pre-Connection Attacks -- 10: Network Penetration Testing -- Gaining Access -- 11: Network Penetration Testing -- Post-Connection Attacks -- 12: Network Penetration Testing -- Detection and Security -- 13: Client-Side Attacks -- Social Engineering -- 14: Performing Website Penetration Testing -- 15: Website Penetration Testing -- Gaining Access -- 16: Best Practices -- Assessments -- Other Books You May Enjoy -- Index. Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Linux. bicssc Computer networking & communications. bicssc Computer security. bicssc Computers Networking General. bisacsh Computers Operating Systems Linux. bisacsh Computers Security General. bisacsh has work: Learn Kali Linux 2019 (Work) https://id.oclc.org/worldcat/entity/E39PCXVBQpJ9cDcCBM7QqTcHG3 https://id.oclc.org/worldcat/ontology/hasWork Print version: Singh, Glen D. Learn Kali Linux 2019 : Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark. Birmingham : Packt Publishing, Limited, ©2019 9781789611809 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2297944 Volltext |
spellingShingle | Singh, Glen D. Learn Kali Linux 2019 : Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark. Learn Kali Linux 2019: perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark -- Dedication -- About Packt -- Contributors -- Table of Contents -- Preface -- Section 1: Kali Linux Basics -- 1: Introduction to Hacking -- 2: Setting Up Kali -- Part 1 -- 3: Setting Up Kali -- Part 2 -- 4: Getting Comfortable with Kali Linux 2019 -- Section 2: Reconnaissance -- 5: Passive Information Gathering -- 6: Active Information Gathering -- Section 3: Vulnerability Assessment and Penetration Testing with Kali Linux 2019 -- 7: Working with Vulnerability Scanners -- 8: Understanding Network Penetration Testing -- 9: Network Penetration Testing -- Pre-Connection Attacks -- 10: Network Penetration Testing -- Gaining Access -- 11: Network Penetration Testing -- Post-Connection Attacks -- 12: Network Penetration Testing -- Detection and Security -- 13: Client-Side Attacks -- Social Engineering -- 14: Performing Website Penetration Testing -- 15: Website Penetration Testing -- Gaining Access -- 16: Best Practices -- Assessments -- Other Books You May Enjoy -- Index. Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Linux. bicssc Computer networking & communications. bicssc Computer security. bicssc Computers Networking General. bisacsh Computers Operating Systems Linux. bisacsh Computers Security General. bisacsh |
subject_GND | http://id.loc.gov/authorities/names/n2014001932 |
title | Learn Kali Linux 2019 : Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark. |
title_auth | Learn Kali Linux 2019 : Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark. |
title_exact_search | Learn Kali Linux 2019 : Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark. |
title_full | Learn Kali Linux 2019 : Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark. |
title_fullStr | Learn Kali Linux 2019 : Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark. |
title_full_unstemmed | Learn Kali Linux 2019 : Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark. |
title_short | Learn Kali Linux 2019 : |
title_sort | learn kali linux 2019 perform powerful penetration testing using kali linux metasploit nessus nmap and wireshark |
title_sub | Perform Powerful Penetration Testing Using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark. |
topic | Kali Linux. http://id.loc.gov/authorities/names/n2014001932 Kali Linux fast Linux. bicssc Computer networking & communications. bicssc Computer security. bicssc Computers Networking General. bisacsh Computers Operating Systems Linux. bisacsh Computers Security General. bisacsh |
topic_facet | Kali Linux. Kali Linux Linux. Computer networking & communications. Computer security. Computers Networking General. Computers Operating Systems Linux. Computers Security General. |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2297944 |
work_keys_str_mv | AT singhglend learnkalilinux2019performpowerfulpenetrationtestingusingkalilinuxmetasploitnessusnmapandwireshark |