| 000 | 01536cam a2200361 i 4500 | ||
|---|---|---|---|
| 001 | 17762383 | ||
| 003 | OSt | ||
| 005 | 20230120114937.0 | ||
| 008 | 130603s2013 ne a b 001 0 eng | ||
| 010 | _a 2013017241 | ||
| 020 | _a9780124116443 (paperback) | ||
| 040 |
_aDLC _beng _cDLC _erda _dDLC |
||
| 042 | _apcc | ||
| 050 | 0 | 0 |
_aQA76.9.A25 _bE5443 2013 |
| 082 | 0 | 0 |
_a005.8 _221 |
| 100 | 1 |
_aEngebretson, Pat _q(Patrick Henry), _d1974- |
|
| 245 | 1 | 4 |
_aThe basics of hacking and penetration testing : _bethical hacking and penetration testing made easy / _cDr. Patrick Engebretson, David Kennedy, Technical Editor. |
| 250 | _aSecond Edition. | ||
| 264 | 1 |
_aAmsterdam ; _aBoston : _bSyngress, an imprint of Elsevier, _c[2013] |
|
| 300 |
_axviii, 204p. : _bill. ; _c23 cm |
||
| 336 |
_atext _2rdacontent |
||
| 337 |
_aunmediated _2rdamedia |
||
| 338 |
_avolume _2rdacarrier |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aWhat is Penetration Testing? -- Reconnaissance -- Scanning -- Exploitation -- Web Based Exploitation -- Maintaining Access with Backdoors and Rootkits -- Wrapping Up the Penetration Test. | |
| 650 | 0 | _aPenetration testing (Computer security) | |
| 650 | 0 | _aHackers. | |
| 650 | 0 |
_aComputer software _xTesting. |
|
| 650 | 0 |
_aComputer crimes _xPrevention. |
|
| 906 |
_a7 _bcbc _corignew _d1 _eecip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _cBK _n0 |
||
| 999 |
_c27 _d27 |
||