|
|
|
|
LEADER |
00000cgm a2200000 i 4500 |
001 |
13664438 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
190122s2018 xx 069 o vleng d |
005 |
20241126143215.2 |
035 |
|
9 |
|a (OCLCCM-CC)1083130554
|
035 |
|
|
|a (OCoLC)1083130554
|
037 |
|
|
|a CL0501000019
|b Safari Books Online
|
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d OCLCQ
|d OCLCO
|
049 |
|
|
|a MAIN
|
050 |
|
4 |
|a QA76.9.A25
|
100 |
1 |
|
|a Gupta, Sunil,
|e speaker.
|
245 |
1 |
0 |
|a Ethical hacking :
|b networks and websites /
|c Sunil Gupta.
|
264 |
|
1 |
|a [Place of publication not identified] :
|b Apress,
|c 2018.
|
300 |
|
|
|a 1 online resource (1 streaming video file (1 hr., 8 min., 56 sec.))
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
511 |
0 |
|
|a Presenter, Sunil Gupta.
|
500 |
|
|
|a Title from resource description page (Safari, viewed January 17, 2019).
|
520 |
|
|
|a "Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scanning with the basic video course, you will now dive deep into these concepts. Starting with setting up your own network penetration lab, you take a look network footprinting, where you will learn to scan your network for vulnerabilities. Following this, you will learn various techniques to exploit your network and perform penetration tests using Kali Linux. Shifting focus to websites, you will go through the key techniques of website footprinting and also see how to find vulnerabilities in your website, where you will work with examples of website exploitation. Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites."--Resource description page
|
650 |
|
0 |
|a Hacking.
|0 http://id.loc.gov/authorities/subjects/sh2013002597
|
650 |
|
0 |
|a Computer security.
|0 http://id.loc.gov/authorities/subjects/sh90001862
|
650 |
|
0 |
|a Penetration testing (Computer security)
|0 http://id.loc.gov/authorities/subjects/sh2011003137
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|0 http://id.loc.gov/authorities/subjects/sh94001277
|
650 |
|
2 |
|a Computer Security
|0 https://id.nlm.nih.gov/mesh/D016494
|
650 |
|
6 |
|a Piratage informatique.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Tests d'intrusion.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Hacking.
|2 fast
|0 (OCoLC)fst01909643
|
650 |
|
7 |
|a Penetration testing (Computer security)
|2 fast
|0 (OCoLC)fst01789566
|
856 |
4 |
0 |
|u https://go.oreilly.com/uchicago/library/view/-/9781484243411/?ar
|y O'Reilly
|
929 |
|
|
|a oclccm
|
999 |
f |
f |
|s 02e3a156-22f4-48c4-8224-71ef4f2a14e7
|i 7c9a1dbf-461f-4976-bfd7-c2022c7b4555
|
928 |
|
|
|t Library of Congress classification
|a QA76.9.A25
|l Online
|c UC-FullText
|u https://go.oreilly.com/uchicago/library/view/-/9781484243411/?ar
|z O'Reilly
|g ebooks
|i 13807376
|