Hands-on penetration testing with Kali NetHunter: spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go
Gespeichert in:
Beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham, UK
Packt Publishing
2019
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781788995177/?ar |
Beschreibung: | Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed April 18, 2019) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781788996686 1788996682 9781788995177 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047721855 | ||
003 | DE-627-1 | ||
005 | 20240228120710.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2019 xx |||||o 00| ||eng c | ||
020 | |a 9781788996686 |9 978-1-78899-668-6 | ||
020 | |a 1788996682 |9 1-78899-668-2 | ||
020 | |a 9781788995177 |9 978-1-78899-517-7 | ||
035 | |a (DE-627-1)047721855 | ||
035 | |a (DE-599)KEP047721855 | ||
035 | |a (ORHE)9781788995177 | ||
035 | |a (DE-627-1)047721855 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20230216 | |
100 | 1 | |a Singh, Glen D. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Hands-on penetration testing with Kali NetHunter |b spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go |c Glen D. Singh, Sean-Philip Oriyano |
264 | 1 | |a Birmingham, UK |b Packt Publishing |c 2019 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed April 18, 2019) | ||
630 | 2 | 0 | |a Kali Linux |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Application software |x Testing | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Kali Linux | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Application software ; Testing | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Penetration testing (Computer security) | |
700 | 1 | |a Oriyano, Sean-Philip |e VerfasserIn |4 aut | |
776 | 1 | |z 1788995171 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 1788995171 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781788995177/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047721855 |
---|---|
_version_ | 1821494860275777536 |
adam_text | |
any_adam_object | |
author | Singh, Glen D. Oriyano, Sean-Philip |
author_facet | Singh, Glen D. Oriyano, Sean-Philip |
author_role | aut aut |
author_sort | Singh, Glen D. |
author_variant | g d s gd gds s p o spo |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047721855 (DE-599)KEP047721855 (ORHE)9781788995177 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02001cam a22005052 4500</leader><controlfield tag="001">ZDB-30-ORH-047721855</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120710.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788996686</subfield><subfield code="9">978-1-78899-668-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788996682</subfield><subfield code="9">1-78899-668-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788995177</subfield><subfield code="9">978-1-78899-517-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047721855</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047721855</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781788995177</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047721855</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20230216</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Singh, Glen D.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Hands-on penetration testing with Kali NetHunter</subfield><subfield code="b">spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go</subfield><subfield code="c">Glen D. Singh, Sean-Philip Oriyano</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed April 18, 2019)</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software ; Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Oriyano, Sean-Philip</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">1788995171</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">1788995171</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781788995177/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047721855 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:05Z |
institution | BVB |
isbn | 9781788996686 1788996682 9781788995177 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt Publishing |
record_format | marc |
spelling | Singh, Glen D. VerfasserIn aut Hands-on penetration testing with Kali NetHunter spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go Glen D. Singh, Sean-Philip Oriyano Birmingham, UK Packt Publishing 2019 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed April 18, 2019) Kali Linux Penetration testing (Computer security) Application software Testing Computer networks Security measures Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Application software ; Testing Computer networks ; Security measures Oriyano, Sean-Philip VerfasserIn aut 1788995171 Erscheint auch als Druck-Ausgabe 1788995171 |
spellingShingle | Singh, Glen D. Oriyano, Sean-Philip Hands-on penetration testing with Kali NetHunter spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go Kali Linux Penetration testing (Computer security) Application software Testing Computer networks Security measures Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Application software ; Testing Computer networks ; Security measures |
title | Hands-on penetration testing with Kali NetHunter spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go |
title_auth | Hands-on penetration testing with Kali NetHunter spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go |
title_exact_search | Hands-on penetration testing with Kali NetHunter spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go |
title_full | Hands-on penetration testing with Kali NetHunter spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go Glen D. Singh, Sean-Philip Oriyano |
title_fullStr | Hands-on penetration testing with Kali NetHunter spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go Glen D. Singh, Sean-Philip Oriyano |
title_full_unstemmed | Hands-on penetration testing with Kali NetHunter spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go Glen D. Singh, Sean-Philip Oriyano |
title_short | Hands-on penetration testing with Kali NetHunter |
title_sort | hands on penetration testing with kali nethunter spy on and protect vulnerable ecosystems using the power of kali linux for pentesting on the go |
title_sub | spy on and protect vulnerable ecosystems using the power of Kali Linux for pentesting on the go |
topic | Kali Linux Penetration testing (Computer security) Application software Testing Computer networks Security measures Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Application software ; Testing Computer networks ; Security measures |
topic_facet | Kali Linux Penetration testing (Computer security) Application software Testing Computer networks Security measures Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Application software ; Testing Computer networks ; Security measures |
work_keys_str_mv | AT singhglend handsonpenetrationtestingwithkalinethunterspyonandprotectvulnerableecosystemsusingthepowerofkalilinuxforpentestingonthego AT oriyanoseanphilip handsonpenetrationtestingwithkalinethunterspyonandprotectvulnerableecosystemsusingthepowerofkalilinuxforpentestingonthego |