Metasploit 5.0 for beginners :: perform penetration testing to secure your IT environment against threats and vulnerabilities /
Metasploit 5.x for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. You will be able to analyze, identify, and exploit threats and vulnerabilities to secure your IT environment.
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham, UK :
Packt Publishing,
2020.
|
Ausgabe: | Second edition. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Metasploit 5.x for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. You will be able to analyze, identify, and exploit threats and vulnerabilities to secure your IT environment. |
Beschreibung: | Previous edition published: 2017. |
Beschreibung: | 1 online resource (1 volume) : illustrations |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781838989491 1838989498 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1194007453 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 200909s2020 enka ob 000 0 eng d | ||
040 | |a UMI |b eng |e rda |e pn |c UMI |d OCLCF |d EBLCP |d UKAHL |d N$T |d UKMGB |d OCLCQ |d OCLCO |d OCLCQ |d OCLCO |d TMA |d OCLCQ | ||
015 | |a GBC0G9117 |2 bnb | ||
016 | 7 | |a 019783614 |2 Uk | |
019 | |a 1151189043 |a 1153977333 | ||
020 | |a 9781838989491 | ||
020 | |a 1838989498 | ||
020 | |z 9781838982669 | ||
035 | |a (OCoLC)1194007453 |z (OCoLC)1151189043 |z (OCoLC)1153977333 | ||
037 | |a CL0501000140 |b Safari Books Online | ||
050 | 4 | |a QA76.9.A25 | |
082 | 7 | |a 005.8 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Rahalkar, Sagar, |e author. | |
245 | 1 | 0 | |a Metasploit 5.0 for beginners : |b perform penetration testing to secure your IT environment against threats and vulnerabilities / |c Sagar Rahalkar. |
246 | 3 | |a Metasploit five point zero for beginners | |
250 | |a Second edition. | ||
264 | 1 | |a Birmingham, UK : |b Packt Publishing, |c 2020. | |
300 | |a 1 online resource (1 volume) : |b illustrations | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
588 | 0 | |a Online resource; title from cover (Safari, viewed September 9, 2020). | |
500 | |a Previous edition published: 2017. | ||
504 | |a Includes bibliographical references. | ||
520 | |a Metasploit 5.x for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. You will be able to analyze, identify, and exploit threats and vulnerabilities to secure your IT environment. | ||
630 | 0 | 0 | |a Metasploit (Electronic resource) |0 http://id.loc.gov/authorities/names/n2011043654 |
630 | 0 | 7 | |a Metasploit (Electronic resource) |2 fast |
650 | 0 | |a Computer security. |0 http://id.loc.gov/authorities/subjects/sh90001862 | |
650 | 0 | |a Computer networks |x Access control. |0 http://id.loc.gov/authorities/subjects/sh2007008424 | |
650 | 0 | |a Penetration testing (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011003137 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Tests d'intrusion. | |
650 | 7 | |a Computer networks |x Access control |2 fast | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Penetration testing (Computer security) |2 fast | |
776 | 0 | 8 | |i Print version: |a Rahalkar, Sagar. |t Metasploit 5. 0 for Beginners : Perform Penetration Testing to Secure Your IT Environment Against Threats and Vulnerabilities, 2nd Edition. |d Birmingham : Packt Publishing, Limited, ©2020 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2436980 |3 Volltext |
938 | |a Askews and Holts Library Services |b ASKH |n AH37368888 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL6175329 | ||
938 | |a EBSCOhost |b EBSC |n 2436980 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1194007453 |
---|---|
_version_ | 1816882528575815680 |
adam_text | |
any_adam_object | |
author | Rahalkar, Sagar |
author_facet | Rahalkar, Sagar |
author_role | aut |
author_sort | Rahalkar, Sagar |
author_variant | s r sr |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
ctrlnum | (OCoLC)1194007453 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03011cam a2200601 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1194007453</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr unu||||||||</controlfield><controlfield tag="008">200909s2020 enka ob 000 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">UMI</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">UMI</subfield><subfield code="d">OCLCF</subfield><subfield code="d">EBLCP</subfield><subfield code="d">UKAHL</subfield><subfield code="d">N$T</subfield><subfield code="d">UKMGB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">GBC0G9117</subfield><subfield code="2">bnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">019783614</subfield><subfield code="2">Uk</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1151189043</subfield><subfield code="a">1153977333</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781838989491</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1838989498</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781838982669</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1194007453</subfield><subfield code="z">(OCoLC)1151189043</subfield><subfield code="z">(OCoLC)1153977333</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">CL0501000140</subfield><subfield code="b">Safari Books Online</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Rahalkar, Sagar,</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Metasploit 5.0 for beginners :</subfield><subfield code="b">perform penetration testing to secure your IT environment against threats and vulnerabilities /</subfield><subfield code="c">Sagar Rahalkar.</subfield></datafield><datafield tag="246" ind1="3" ind2=" "><subfield code="a">Metasploit five point zero for beginners</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK :</subfield><subfield code="b">Packt Publishing,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 volume) :</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Online resource; title from cover (Safari, viewed September 9, 2020).</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Previous edition published: 2017.</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Metasploit 5.x for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. You will be able to analyze, identify, and exploit threats and vulnerabilities to secure your IT environment.</subfield></datafield><datafield tag="630" ind1="0" ind2="0"><subfield code="a">Metasploit (Electronic resource)</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2011043654</subfield></datafield><datafield tag="630" ind1="0" ind2="7"><subfield code="a">Metasploit (Electronic resource)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh90001862</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Access control.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2007008424</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011003137</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Tests d'intrusion.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer networks</subfield><subfield code="x">Access control</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Rahalkar, Sagar.</subfield><subfield code="t">Metasploit 5. 0 for Beginners : Perform Penetration Testing to Secure Your IT Environment Against Threats and Vulnerabilities, 2nd Edition.</subfield><subfield code="d">Birmingham : Packt Publishing, Limited, ©2020</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2436980</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH37368888</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6175329</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2436980</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1194007453 |
illustrated | Illustrated |
indexdate | 2024-11-27T13:30:03Z |
institution | BVB |
isbn | 9781838989491 1838989498 |
language | English |
oclc_num | 1194007453 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (1 volume) : illustrations |
psigel | ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Packt Publishing, |
record_format | marc |
spelling | Rahalkar, Sagar, author. Metasploit 5.0 for beginners : perform penetration testing to secure your IT environment against threats and vulnerabilities / Sagar Rahalkar. Metasploit five point zero for beginners Second edition. Birmingham, UK : Packt Publishing, 2020. 1 online resource (1 volume) : illustrations text txt rdacontent computer c rdamedia online resource cr rdacarrier Online resource; title from cover (Safari, viewed September 9, 2020). Previous edition published: 2017. Includes bibliographical references. Metasploit 5.x for Beginners will provide a good starting point to perform penetration testing and identify threats and vulnerabilities to secure your IT environment. You will be able to analyze, identify, and exploit threats and vulnerabilities to secure your IT environment. Metasploit (Electronic resource) http://id.loc.gov/authorities/names/n2011043654 Metasploit (Electronic resource) fast Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Access control. http://id.loc.gov/authorities/subjects/sh2007008424 Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Tests d'intrusion. Computer networks Access control fast Computer security fast Penetration testing (Computer security) fast Print version: Rahalkar, Sagar. Metasploit 5. 0 for Beginners : Perform Penetration Testing to Secure Your IT Environment Against Threats and Vulnerabilities, 2nd Edition. Birmingham : Packt Publishing, Limited, ©2020 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2436980 Volltext |
spellingShingle | Rahalkar, Sagar Metasploit 5.0 for beginners : perform penetration testing to secure your IT environment against threats and vulnerabilities / Metasploit (Electronic resource) http://id.loc.gov/authorities/names/n2011043654 Metasploit (Electronic resource) fast Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Access control. http://id.loc.gov/authorities/subjects/sh2007008424 Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Tests d'intrusion. Computer networks Access control fast Computer security fast Penetration testing (Computer security) fast |
subject_GND | http://id.loc.gov/authorities/names/n2011043654 http://id.loc.gov/authorities/subjects/sh90001862 http://id.loc.gov/authorities/subjects/sh2007008424 http://id.loc.gov/authorities/subjects/sh2011003137 https://id.nlm.nih.gov/mesh/D016494 |
title | Metasploit 5.0 for beginners : perform penetration testing to secure your IT environment against threats and vulnerabilities / |
title_alt | Metasploit five point zero for beginners |
title_auth | Metasploit 5.0 for beginners : perform penetration testing to secure your IT environment against threats and vulnerabilities / |
title_exact_search | Metasploit 5.0 for beginners : perform penetration testing to secure your IT environment against threats and vulnerabilities / |
title_full | Metasploit 5.0 for beginners : perform penetration testing to secure your IT environment against threats and vulnerabilities / Sagar Rahalkar. |
title_fullStr | Metasploit 5.0 for beginners : perform penetration testing to secure your IT environment against threats and vulnerabilities / Sagar Rahalkar. |
title_full_unstemmed | Metasploit 5.0 for beginners : perform penetration testing to secure your IT environment against threats and vulnerabilities / Sagar Rahalkar. |
title_short | Metasploit 5.0 for beginners : |
title_sort | metasploit 5 0 for beginners perform penetration testing to secure your it environment against threats and vulnerabilities |
title_sub | perform penetration testing to secure your IT environment against threats and vulnerabilities / |
topic | Metasploit (Electronic resource) http://id.loc.gov/authorities/names/n2011043654 Metasploit (Electronic resource) fast Computer security. http://id.loc.gov/authorities/subjects/sh90001862 Computer networks Access control. http://id.loc.gov/authorities/subjects/sh2007008424 Penetration testing (Computer security) http://id.loc.gov/authorities/subjects/sh2011003137 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Tests d'intrusion. Computer networks Access control fast Computer security fast Penetration testing (Computer security) fast |
topic_facet | Metasploit (Electronic resource) Computer security. Computer networks Access control. Penetration testing (Computer security) Computer Security Sécurité informatique. Tests d'intrusion. Computer networks Access control Computer security |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2436980 |
work_keys_str_mv | AT rahalkarsagar metasploit50forbeginnersperformpenetrationtestingtosecureyouritenvironmentagainstthreatsandvulnerabilities AT rahalkarsagar metasploitfivepointzeroforbeginners |