Learning Nessus for Penetration Testing
This book is a friendly tutorial that uses several examples of real-world scanning and exploitation processes which will help get you on the road to becoming an expert penetration tester.Learning Nessus for Penetration Testing is ideal for security professionals and network administrators who wish t...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham
Packt Publishing
2014
|
Schlagworte: | |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV043606906 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 160616s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781783551002 |9 978-1-78355-100-2 | ||
020 | |a 9781783550999 |c Print |9 978-1-78355-099-9 | ||
035 | |a (ZDB-30-PQE)EBC1572937 | ||
035 | |a (ZDB-89-EBL)EBL1572937 | ||
035 | |a (ZDB-38-EBR)ebr10832261 | ||
035 | |a (OCoLC)869521198 | ||
035 | |a (DE-599)BVBBV043606906 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Kumar, Himanshu |e Verfasser |4 aut | |
245 | 1 | 0 | |a Learning Nessus for Penetration Testing |
264 | 1 | |a Birmingham |b Packt Publishing |c 2014 | |
264 | 4 | |c © 2014 | |
300 | |a 1 online resource (132 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on publisher supplied metadata and other sources | ||
520 | |a This book is a friendly tutorial that uses several examples of real-world scanning and exploitation processes which will help get you on the road to becoming an expert penetration tester.Learning Nessus for Penetration Testing is ideal for security professionals and network administrators who wish to learn how to use Nessus to conduct vulnerability assessments to identify vulnerabilities in IT infrastructure quickly and efficiently | ||
650 | 4 | |a Computer networks -- Security measures -- Software | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |a Kumar, Himanshu |t Learning Nessus for Penetration Testing |
912 | |a ZDB-30-PQE |a ZDB-38-ESG | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-029020965 |
Datensatz im Suchindex
_version_ | 1804176353905344512 |
---|---|
any_adam_object | |
author | Kumar, Himanshu |
author_facet | Kumar, Himanshu |
author_role | aut |
author_sort | Kumar, Himanshu |
author_variant | h k hk |
building | Verbundindex |
bvnumber | BV043606906 |
collection | ZDB-30-PQE ZDB-38-ESG |
ctrlnum | (ZDB-30-PQE)EBC1572937 (ZDB-89-EBL)EBL1572937 (ZDB-38-EBR)ebr10832261 (OCoLC)869521198 (DE-599)BVBBV043606906 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01666nmm a2200373zc 4500</leader><controlfield tag="001">BV043606906</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783551002</subfield><subfield code="9">978-1-78355-100-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783550999</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-78355-099-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1572937</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1572937</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10832261</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)869521198</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043606906</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kumar, Himanshu</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learning Nessus for Penetration Testing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (132 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is a friendly tutorial that uses several examples of real-world scanning and exploitation processes which will help get you on the road to becoming an expert penetration tester.Learning Nessus for Penetration Testing is ideal for security professionals and network administrators who wish to learn how to use Nessus to conduct vulnerability assessments to identify vulnerabilities in IT infrastructure quickly and efficiently</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks -- Security measures -- Software</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Kumar, Himanshu</subfield><subfield code="t">Learning Nessus for Penetration Testing</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029020965</subfield></datafield></record></collection> |
id | DE-604.BV043606906 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T07:30:50Z |
institution | BVB |
isbn | 9781783551002 9781783550999 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-029020965 |
oclc_num | 869521198 |
open_access_boolean | |
physical | 1 online resource (132 pages) |
psigel | ZDB-30-PQE ZDB-38-ESG |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Packt Publishing |
record_format | marc |
spelling | Kumar, Himanshu Verfasser aut Learning Nessus for Penetration Testing Birmingham Packt Publishing 2014 © 2014 1 online resource (132 pages) txt rdacontent c rdamedia cr rdacarrier Description based on publisher supplied metadata and other sources This book is a friendly tutorial that uses several examples of real-world scanning and exploitation processes which will help get you on the road to becoming an expert penetration tester.Learning Nessus for Penetration Testing is ideal for security professionals and network administrators who wish to learn how to use Nessus to conduct vulnerability assessments to identify vulnerabilities in IT infrastructure quickly and efficiently Computer networks -- Security measures -- Software Erscheint auch als Druck-Ausgabe Kumar, Himanshu Learning Nessus for Penetration Testing |
spellingShingle | Kumar, Himanshu Learning Nessus for Penetration Testing Computer networks -- Security measures -- Software |
title | Learning Nessus for Penetration Testing |
title_auth | Learning Nessus for Penetration Testing |
title_exact_search | Learning Nessus for Penetration Testing |
title_full | Learning Nessus for Penetration Testing |
title_fullStr | Learning Nessus for Penetration Testing |
title_full_unstemmed | Learning Nessus for Penetration Testing |
title_short | Learning Nessus for Penetration Testing |
title_sort | learning nessus for penetration testing |
topic | Computer networks -- Security measures -- Software |
topic_facet | Computer networks -- Security measures -- Software |
work_keys_str_mv | AT kumarhimanshu learningnessusforpenetrationtesting |