Learning Nessus for Penetration Testing

This book is a friendly tutorial that uses several examples of real-world scanning and exploitation processes which will help get you on the road to becoming an expert penetration tester.Learning Nessus for Penetration Testing is ideal for security professionals and network administrators who wish t...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Kumar, Himanshu (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham Packt Publishing 2014
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nmm a2200000zc 4500
001 BV043606906
003 DE-604
005 00000000000000.0
007 cr|uuu---uuuuu
008 160616s2014 |||| o||u| ||||||eng d
020 |a 9781783551002  |9 978-1-78355-100-2 
020 |a 9781783550999  |c Print  |9 978-1-78355-099-9 
035 |a (ZDB-30-PQE)EBC1572937 
035 |a (ZDB-89-EBL)EBL1572937 
035 |a (ZDB-38-EBR)ebr10832261 
035 |a (OCoLC)869521198 
035 |a (DE-599)BVBBV043606906 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
082 0 |a 005.8 
100 1 |a Kumar, Himanshu  |e Verfasser  |4 aut 
245 1 0 |a Learning Nessus for Penetration Testing 
264 1 |a Birmingham  |b Packt Publishing  |c 2014 
264 4 |c © 2014 
300 |a 1 online resource (132 pages) 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Description based on publisher supplied metadata and other sources 
520 |a This book is a friendly tutorial that uses several examples of real-world scanning and exploitation processes which will help get you on the road to becoming an expert penetration tester.Learning Nessus for Penetration Testing is ideal for security professionals and network administrators who wish to learn how to use Nessus to conduct vulnerability assessments to identify vulnerabilities in IT infrastructure quickly and efficiently 
650 4 |a Computer networks -- Security measures -- Software 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |a Kumar, Himanshu  |t Learning Nessus for Penetration Testing 
912 |a ZDB-30-PQE  |a ZDB-38-ESG 
999 |a oai:aleph.bib-bvb.de:BVB01-029020965 

Datensatz im Suchindex

_version_ 1804176353905344512
any_adam_object
author Kumar, Himanshu
author_facet Kumar, Himanshu
author_role aut
author_sort Kumar, Himanshu
author_variant h k hk
building Verbundindex
bvnumber BV043606906
collection ZDB-30-PQE
ZDB-38-ESG
ctrlnum (ZDB-30-PQE)EBC1572937
(ZDB-89-EBL)EBL1572937
(ZDB-38-EBR)ebr10832261
(OCoLC)869521198
(DE-599)BVBBV043606906
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01666nmm a2200373zc 4500</leader><controlfield tag="001">BV043606906</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">160616s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783551002</subfield><subfield code="9">978-1-78355-100-2</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781783550999</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-78355-099-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-30-PQE)EBC1572937</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-89-EBL)EBL1572937</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-38-EBR)ebr10832261</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)869521198</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV043606906</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Kumar, Himanshu</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learning Nessus for Penetration Testing</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">2014</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (132 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book is a friendly tutorial that uses several examples of real-world scanning and exploitation processes which will help get you on the road to becoming an expert penetration tester.Learning Nessus for Penetration Testing is ideal for security professionals and network administrators who wish to learn how to use Nessus to conduct vulnerability assessments to identify vulnerabilities in IT infrastructure quickly and efficiently</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks -- Security measures -- Software</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="a">Kumar, Himanshu</subfield><subfield code="t">Learning Nessus for Penetration Testing</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield><subfield code="a">ZDB-38-ESG</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-029020965</subfield></datafield></record></collection>
id DE-604.BV043606906
illustrated Not Illustrated
indexdate 2024-07-10T07:30:50Z
institution BVB
isbn 9781783551002
9781783550999
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-029020965
oclc_num 869521198
open_access_boolean
physical 1 online resource (132 pages)
psigel ZDB-30-PQE
ZDB-38-ESG
publishDate 2014
publishDateSearch 2014
publishDateSort 2014
publisher Packt Publishing
record_format marc
spelling Kumar, Himanshu Verfasser aut
Learning Nessus for Penetration Testing
Birmingham Packt Publishing 2014
© 2014
1 online resource (132 pages)
txt rdacontent
c rdamedia
cr rdacarrier
Description based on publisher supplied metadata and other sources
This book is a friendly tutorial that uses several examples of real-world scanning and exploitation processes which will help get you on the road to becoming an expert penetration tester.Learning Nessus for Penetration Testing is ideal for security professionals and network administrators who wish to learn how to use Nessus to conduct vulnerability assessments to identify vulnerabilities in IT infrastructure quickly and efficiently
Computer networks -- Security measures -- Software
Erscheint auch als Druck-Ausgabe Kumar, Himanshu Learning Nessus for Penetration Testing
spellingShingle Kumar, Himanshu
Learning Nessus for Penetration Testing
Computer networks -- Security measures -- Software
title Learning Nessus for Penetration Testing
title_auth Learning Nessus for Penetration Testing
title_exact_search Learning Nessus for Penetration Testing
title_full Learning Nessus for Penetration Testing
title_fullStr Learning Nessus for Penetration Testing
title_full_unstemmed Learning Nessus for Penetration Testing
title_short Learning Nessus for Penetration Testing
title_sort learning nessus for penetration testing
topic Computer networks -- Security measures -- Software
topic_facet Computer networks -- Security measures -- Software
work_keys_str_mv AT kumarhimanshu learningnessusforpenetrationtesting