Gespeichert in:
Beteiligte Personen: | , , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
San Francisco, CA
No Starch Press
[2025]
|
Ausgabe: | 2nd edition. |
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9798341620032/?ar |
Zusammenfassung: | Metasploit: The Penetration Tester's Guide has been the definitive security assessment resource for over a decade. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless, but using it can be challenging for newcomers. |
Beschreibung: | Includes index |
Umfang: | 1 Online-Ressource (288 pages) illustrations |
Internformat
MARC
LEADER | 00000nam a22000002c 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-111748860 | ||
003 | DE-627-1 | ||
005 | 20250109140336.0 | ||
007 | cr uuu---uuuuu | ||
008 | 250109s2025 xx |||||o 00| ||eng c | ||
035 | |a (DE-627-1)111748860 | ||
035 | |a (DE-599)KEP111748860 | ||
035 | |a (ORHE)9798341620032 | ||
035 | |a (DE-627-1)111748860 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
082 | 0 | |a 005.8 |2 23/eng/20241210 | |
100 | 1 | |a Kennedy, David |d 1982- |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Metasploit |b the penetration tester's guide |c by David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, and Daniel G. Graham |
250 | |a 2nd edition. | ||
264 | 1 | |a San Francisco, CA |b No Starch Press |c [2025] | |
300 | |a 1 Online-Ressource (288 pages) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
520 | |a Metasploit: The Penetration Tester's Guide has been the definitive security assessment resource for over a decade. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless, but using it can be challenging for newcomers. | ||
630 | 2 | 0 | |a Metasploit (Electronic resource) |
650 | 0 | |a Computers |x Access control | |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer networks |x Security measures |x Testing | |
650 | 4 | |a Ordinateurs ; Accès ; Contrôle | |
650 | 4 | |a Tests d'intrusion | |
700 | 1 | |a Aharoni, Mati |e VerfasserIn |4 aut | |
700 | 1 | |a Kearns, Devon |e VerfasserIn |4 aut | |
700 | 1 | |a O'Gorman, Jim |e VerfasserIn |4 aut | |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9798341620032/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-111748860 |
---|---|
_version_ | 1835903239821721600 |
adam_text | |
any_adam_object | |
author | Kennedy, David 1982- Aharoni, Mati Kearns, Devon O'Gorman, Jim |
author_facet | Kennedy, David 1982- Aharoni, Mati Kearns, Devon O'Gorman, Jim |
author_role | aut aut aut aut |
author_sort | Kennedy, David 1982- |
author_variant | d k dk m a ma d k dk j o jo |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)111748860 (DE-599)KEP111748860 (ORHE)9798341620032 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | 2nd edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01824nam a22004332c 4500</leader><controlfield tag="001">ZDB-30-ORH-111748860</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20250109140336.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">250109s2025 xx |||||o 00| ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)111748860</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP111748860</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9798341620032</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)111748860</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20241210</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kennedy, David</subfield><subfield code="d">1982-</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Metasploit</subfield><subfield code="b">the penetration tester's guide</subfield><subfield code="c">by David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, and Daniel G. Graham</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">San Francisco, CA</subfield><subfield code="b">No Starch Press</subfield><subfield code="c">[2025]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (288 pages)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Metasploit: The Penetration Tester's Guide has been the definitive security assessment resource for over a decade. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless, but using it can be challenging for newcomers.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Metasploit (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs ; Accès ; Contrôle</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Aharoni, Mati</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kearns, Devon</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">O'Gorman, Jim</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9798341620032/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-111748860 |
illustrated | Illustrated |
indexdate | 2025-06-25T12:16:07Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (288 pages) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2025 |
publishDateSearch | 2025 |
publishDateSort | 2025 |
publisher | No Starch Press |
record_format | marc |
spelling | Kennedy, David 1982- VerfasserIn aut Metasploit the penetration tester's guide by David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, and Daniel G. Graham 2nd edition. San Francisco, CA No Starch Press [2025] 1 Online-Ressource (288 pages) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes index Metasploit: The Penetration Tester's Guide has been the definitive security assessment resource for over a decade. The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless, but using it can be challenging for newcomers. Metasploit (Electronic resource) Computers Access control Penetration testing (Computer security) Computer networks Security measures Testing Ordinateurs ; Accès ; Contrôle Tests d'intrusion Aharoni, Mati VerfasserIn aut Kearns, Devon VerfasserIn aut O'Gorman, Jim VerfasserIn aut |
spellingShingle | Kennedy, David 1982- Aharoni, Mati Kearns, Devon O'Gorman, Jim Metasploit the penetration tester's guide Metasploit (Electronic resource) Computers Access control Penetration testing (Computer security) Computer networks Security measures Testing Ordinateurs ; Accès ; Contrôle Tests d'intrusion |
title | Metasploit the penetration tester's guide |
title_auth | Metasploit the penetration tester's guide |
title_exact_search | Metasploit the penetration tester's guide |
title_full | Metasploit the penetration tester's guide by David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, and Daniel G. Graham |
title_fullStr | Metasploit the penetration tester's guide by David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, and Daniel G. Graham |
title_full_unstemmed | Metasploit the penetration tester's guide by David Kennedy, Mati Aharoni, Devon Kearns, Jim O'Gorman, and Daniel G. Graham |
title_short | Metasploit |
title_sort | metasploit the penetration tester s guide |
title_sub | the penetration tester's guide |
topic | Metasploit (Electronic resource) Computers Access control Penetration testing (Computer security) Computer networks Security measures Testing Ordinateurs ; Accès ; Contrôle Tests d'intrusion |
topic_facet | Metasploit (Electronic resource) Computers Access control Penetration testing (Computer security) Computer networks Security measures Testing Ordinateurs ; Accès ; Contrôle Tests d'intrusion |
work_keys_str_mv | AT kennedydavid metasploitthepenetrationtestersguide AT aharonimati metasploitthepenetrationtestersguide AT kearnsdevon metasploitthepenetrationtestersguide AT ogormanjim metasploitthepenetrationtestersguide |