| 000 | 02227cam a2200385 i 4500 | ||
|---|---|---|---|
| 999 |
_c233293 _d233293 |
||
| 001 | 18066598 | ||
| 003 | Nust | ||
| 005 | 20170306151543.0 | ||
| 008 | 140313t20152015flua b 001 0 eng | ||
| 010 | _a 2014006695 | ||
| 020 | _a9781482231618 (paperback) | ||
| 020 | _a1482231611 (paperback) | ||
| 040 |
_aDLC _beng _cDLC _erda _dDLC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bB356 2015 |
| 082 | 0 | 0 |
_a005.8 BAL _223 |
| 084 |
_aCOM053000 _aCOM043000 _aLAW041000 _2bisacsh |
||
| 100 | 1 | _aBaloch, Rafay. | |
| 245 | 1 | 0 |
_aEthical hacking and penetration testing guide / _cRafay Baloch. |
| 264 | 1 |
_aBoca Raton : _bCRC Press, Taylor & Francis Group, _c[2015] |
|
| 264 | 4 | _c©2015 | |
| 300 |
_axxvii, 503 pages : _billustrations ; _c26 cm |
||
| 336 |
_atext _2rdacontent |
||
| 337 |
_aunmediated _2rdamedia |
||
| 338 |
_avolume _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 520 |
_a"This book introduces the steps required to complete a penetration test, or ethical hack. Requiring no prior hacking experience, the book explains how to utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. Simple explanations of how to use these tools and a four-step methodology for conducting a penetration test provide readers with a better understanding of offensive security. "-- _cProvided by publisher. |
||
| 650 | 0 | _aPenetration testing (Computer security) | |
| 650 | 7 |
_aCOMPUTERS / Security / General. _2bisacsh |
|
| 650 | 7 |
_aCOMPUTERS / Networking / General. _2bisacsh |
|
| 650 | 7 |
_aLAW / Forensic Science. _2bisacsh |
|
| 856 | 4 | 2 |
_3Cover image _uhttp://images.tandf.co.uk/common/jackets/websmall/978148223/9781482231618.jpg |
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK |
||