Learn Kali Linux 2019: perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark
Gespeichert in:
Beteilige Person: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Birmingham, UK
Packt Publishing
2019
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781789611809/?ar |
Beschreibung: | Includes bibliographical references. - Online resource; title from title page (Safari, viewed April 6, 2020) |
Umfang: | 1 Online-Ressource (1 volume) illustrations |
ISBN: | 9781789612622 1789612624 9781789611809 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-049355740 | ||
003 | DE-627-1 | ||
005 | 20240228121021.0 | ||
007 | cr uuu---uuuuu | ||
008 | 200120s2019 xx |||||o 00| ||eng c | ||
020 | |a 9781789612622 |9 978-1-78961-262-2 | ||
020 | |a 1789612624 |9 1-78961-262-4 | ||
020 | |a 9781789611809 |9 978-1-78961-180-9 | ||
035 | |a (DE-627-1)049355740 | ||
035 | |a (DE-599)KEP049355740 | ||
035 | |a (ORHE)9781789611809 | ||
035 | |a (DE-627-1)049355740 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Singh, Glen D. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Learn Kali Linux 2019 |b perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark |c Glen D. Singh |
264 | 1 | |a Birmingham, UK |b Packt Publishing |c 2019 | |
300 | |a 1 Online-Ressource (1 volume) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references. - Online resource; title from title page (Safari, viewed April 6, 2020) | ||
630 | 2 | 0 | |a Kali Linux |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Application software |x Testing | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 4 | |a Kali Linux | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Application software ; Testing | |
650 | 4 | |a Computer networks ; Security measures | |
650 | 4 | |a Penetration testing (Computer security) | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781789611809/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-049355740 |
---|---|
_version_ | 1821494845821157376 |
adam_text | |
any_adam_object | |
author | Singh, Glen D. |
author_facet | Singh, Glen D. |
author_role | aut |
author_sort | Singh, Glen D. |
author_variant | g d s gd gds |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)049355740 (DE-599)KEP049355740 (ORHE)9781789611809 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01773cam a22004692 4500</leader><controlfield tag="001">ZDB-30-ORH-049355740</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228121021.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">200120s2019 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789612622</subfield><subfield code="9">978-1-78961-262-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1789612624</subfield><subfield code="9">1-78961-262-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781789611809</subfield><subfield code="9">978-1-78961-180-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)049355740</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP049355740</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781789611809</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)049355740</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Singh, Glen D.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learn Kali Linux 2019</subfield><subfield code="b">perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark</subfield><subfield code="c">Glen D. Singh</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2019</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (1 volume)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references. - Online resource; title from title page (Safari, viewed April 6, 2020)</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Application software</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Application software ; Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781789611809/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-049355740 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:20:51Z |
institution | BVB |
isbn | 9781789612622 1789612624 9781789611809 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (1 volume) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | Packt Publishing |
record_format | marc |
spelling | Singh, Glen D. VerfasserIn aut Learn Kali Linux 2019 perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Glen D. Singh Birmingham, UK Packt Publishing 2019 1 Online-Ressource (1 volume) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references. - Online resource; title from title page (Safari, viewed April 6, 2020) Kali Linux Penetration testing (Computer security) Application software Testing Computer networks Security measures Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Application software ; Testing Computer networks ; Security measures |
spellingShingle | Singh, Glen D. Learn Kali Linux 2019 perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Kali Linux Penetration testing (Computer security) Application software Testing Computer networks Security measures Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Application software ; Testing Computer networks ; Security measures |
title | Learn Kali Linux 2019 perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark |
title_auth | Learn Kali Linux 2019 perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark |
title_exact_search | Learn Kali Linux 2019 perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark |
title_full | Learn Kali Linux 2019 perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Glen D. Singh |
title_fullStr | Learn Kali Linux 2019 perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Glen D. Singh |
title_full_unstemmed | Learn Kali Linux 2019 perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark Glen D. Singh |
title_short | Learn Kali Linux 2019 |
title_sort | learn kali linux 2019 perform powerful penetration testing using kali linux metasploit nessus nmap and wireshark |
title_sub | perform powerful penetration testing using Kali Linux, Metasploit, Nessus, Nmap, and Wireshark |
topic | Kali Linux Penetration testing (Computer security) Application software Testing Computer networks Security measures Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Application software ; Testing Computer networks ; Security measures |
topic_facet | Kali Linux Penetration testing (Computer security) Application software Testing Computer networks Security measures Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Application software ; Testing Computer networks ; Security measures |
work_keys_str_mv | AT singhglend learnkalilinux2019performpowerfulpenetrationtestingusingkalilinuxmetasploitnessusnmapandwireshark |