Kali Linux, an ethical hacker's cookbook: practical recipes that combine strategies, attacks, and tools for advanced penetration testing
With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core func...
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham, UK
Packt Publishing
2019
|
Ausgabe: | Second edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781789952308/?ar |
Zusammenfassung: | With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities. |
Beschreibung: | Previous edition published: 2017. - Includes bibliographical references. - Online resource; title from title page (Safari, viewed May 15, 2019) |
Umfang: | 1 Online-Ressource illustrations |
ISBN: | 9781789953701 1789953707 9781789952308 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047732806 | ||
003 | DE-627-1 | ||
005 | 20240228120731.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2019 xx |||||o 00| ||eng c | ||
020 | |a 9781789953701 |9 978-1-78995-370-1 | ||
020 | |a 1789953707 |9 1-78995-370-7 | ||
020 | |a 9781789952308 |9 978-1-78995-230-8 | ||
035 | |a (DE-627-1)047732806 | ||
035 | |a (DE-599)KEP047732806 | ||
035 | |a (ORHE)9781789952308 | ||
035 | |a (DE-627-1)047732806 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Sharma, Himanshu |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Kali Linux, an ethical hacker's cookbook |b practical recipes that combine strategies, attacks, and tools for advanced penetration testing |c Himanshu Sharma |
250 | |a Second edition. | ||
264 | 1 | |a Birmingham, UK |b Packt Publishing |c 2019 | |
300 | |a 1 Online-Ressource |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Previous edition published: 2017. - Includes bibliographical references. - Online resource; title from title page (Safari, viewed May 15, 2019) | ||
520 | |a With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities. | ||
630 | 2 | 0 | |a Kali Linux |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer security | |
650 | 0 | |a Computers |x Access control | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Kali Linux | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Ordinateurs ; Accès ; Contrôle | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; Online Safety & Privacy | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Computer security | |
650 | 4 | |a Computers ; Access control | |
650 | 4 | |a Penetration testing (Computer security) | |
776 | 1 | |z 9781789952308 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781789952308 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781789952308/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047732806 |
---|---|
_version_ | 1821494859617271808 |
adam_text | |
any_adam_object | |
author | Sharma, Himanshu |
author_facet | Sharma, Himanshu |
author_role | aut |
author_sort | Sharma, Himanshu |
author_variant | h s hs |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047732806 (DE-599)KEP047732806 (ORHE)9781789952308 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | Second edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02710cam a22006492 4500</leader><controlfield tag="001">ZDB-30-ORH-047732806</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120731.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789953701</subfield><subfield code="9">978-1-78995-370-1</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1789953707</subfield><subfield code="9">1-78995-370-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789952308</subfield><subfield code="9">978-1-78995-230-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047732806</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047732806</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781789952308</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047732806</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sharma, Himanshu</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Kali Linux, an ethical hacker's cookbook</subfield><subfield code="b">practical recipes that combine strategies, attacks, and tools for advanced penetration testing</subfield><subfield code="c">Himanshu Sharma</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Second edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Previous edition published: 2017. - Includes bibliographical references. - Online resource; title from title page (Safari, viewed May 15, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs ; Accès ; Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; Online Safety & Privacy</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers ; Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781789952308</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781789952308</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781789952308/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047732806 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:05Z |
institution | BVB |
isbn | 9781789953701 1789953707 9781789952308 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt Publishing |
record_format | marc |
spelling | Sharma, Himanshu VerfasserIn aut Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing Himanshu Sharma Second edition. Birmingham, UK Packt Publishing 2019 1 Online-Ressource illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Previous edition published: 2017. - Includes bibliographical references. - Online resource; title from title page (Safari, viewed May 15, 2019) With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2018.4/2019) as per your requirements and help you move on to core functionalities. Kali Linux Penetration testing (Computer security) Computer security Computers Access control Computer networks Security measures Computer Security Tests d'intrusion Sécurité informatique Ordinateurs ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; General COMPUTERS ; Networking ; Security COMPUTERS ; Security ; Online Safety & Privacy Computer networks ; Security measures Computers ; Access control 9781789952308 Erscheint auch als Druck-Ausgabe 9781789952308 |
spellingShingle | Sharma, Himanshu Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing Kali Linux Penetration testing (Computer security) Computer security Computers Access control Computer networks Security measures Computer Security Tests d'intrusion Sécurité informatique Ordinateurs ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; General COMPUTERS ; Networking ; Security COMPUTERS ; Security ; Online Safety & Privacy Computer networks ; Security measures Computers ; Access control |
title | Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing |
title_auth | Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing |
title_exact_search | Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing |
title_full | Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing Himanshu Sharma |
title_fullStr | Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing Himanshu Sharma |
title_full_unstemmed | Kali Linux, an ethical hacker's cookbook practical recipes that combine strategies, attacks, and tools for advanced penetration testing Himanshu Sharma |
title_short | Kali Linux, an ethical hacker's cookbook |
title_sort | kali linux an ethical hacker s cookbook practical recipes that combine strategies attacks and tools for advanced penetration testing |
title_sub | practical recipes that combine strategies, attacks, and tools for advanced penetration testing |
topic | Kali Linux Penetration testing (Computer security) Computer security Computers Access control Computer networks Security measures Computer Security Tests d'intrusion Sécurité informatique Ordinateurs ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; General COMPUTERS ; Networking ; Security COMPUTERS ; Security ; Online Safety & Privacy Computer networks ; Security measures Computers ; Access control |
topic_facet | Kali Linux Penetration testing (Computer security) Computer security Computers Access control Computer networks Security measures Computer Security Tests d'intrusion Sécurité informatique Ordinateurs ; Accès ; Contrôle Réseaux d'ordinateurs ; Sécurité ; Mesures COMPUTERS ; Security ; General COMPUTERS ; Networking ; Security COMPUTERS ; Security ; Online Safety & Privacy Computer networks ; Security measures Computers ; Access control |
work_keys_str_mv | AT sharmahimanshu kalilinuxanethicalhackerscookbookpracticalrecipesthatcombinestrategiesattacksandtoolsforadvancedpenetrationtesting |