Mastering Metasploit take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Jaswal, Nipun 19XX- (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Birmingham, UK ; Mumbai Packt May 2018
Ausgabe:Third edition
Schlagworte:
Online-Zugang:DE-706
URL des Erstveröffentlichers
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000zc 4500
001 BV045144483
003 DE-604
005 20200506
007 cr|uuu---uuuuu
008 180823s2018 xx a||| o|||| 00||| eng d
020 |a 9781788994200  |9 978-1-78899-420-0 
020 |a 1788994205  |9 1-78899-420-5 
035 |a (ZDB-32-STB)on1041858471 
035 |a (OCoLC)1041858471 
035 |a (DE-599)BVBBV045144483 
040 |a DE-604  |b ger  |e rda 
041 0 |a eng 
049 |a DE-706 
084 |a ST 277  |0 (DE-625)143643:  |2 rvk 
100 1 |a Jaswal, Nipun  |d 19XX-  |e Verfasser  |0 (DE-588)1160324301  |4 aut 
245 1 0 |a Mastering Metasploit  |b take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit  |c Nipun Jaswal 
250 |a Third edition 
264 1 |a Birmingham, UK ; Mumbai  |b Packt  |c May 2018 
300 |a 1 Online-Ressource (vii, 472 Seiten)  |b Illustrationen 
336 |b txt  |2 rdacontent 
337 |b c  |2 rdamedia 
338 |b cr  |2 rdacarrier 
500 |a Description based on online resource; title from title page (Safari, viewed June 25, 2018) 
630 0 4 |a Metasploit (Electronic resource) 
650 4 |a Computer security 
650 4 |a Computers  |x Access control 
650 4 |a Penetration testing (Computer security) 
650 0 7 |a Penetrationstest  |0 (DE-588)4825817-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Computersicherheit  |0 (DE-588)4274324-2  |2 gnd  |9 rswk-swf 
689 0 0 |a Computersicherheit  |0 (DE-588)4274324-2  |D s 
689 0 1 |a Penetrationstest  |0 (DE-588)4825817-9  |D s 
689 0 |5 DE-604 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781788990615 
856 4 0 |u http://proquest.tech.safaribooksonline.de/9781788990615  |x Aggregator  |z URL des Erstveröffentlichers  |3 Volltext 
912 |a ZDB-32-STB 
912 |a ZDB-4-NLEBK 
912 |a ZDB-5-WPSE 
943 1 |a oai:aleph.bib-bvb.de:BVB01-030534264 
966 e |u http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db=nlabk&AN=1827509  |l DE-706  |p ZDB-4-NLEBK  |q UBY01_DDA20  |x Aggregator  |3 Volltext 

Datensatz im Suchindex

_version_ 1819303517228105728
any_adam_object
author Jaswal, Nipun 19XX-
author_GND (DE-588)1160324301
author_facet Jaswal, Nipun 19XX-
author_role aut
author_sort Jaswal, Nipun 19XX-
author_variant n j nj
building Verbundindex
bvnumber BV045144483
classification_rvk ST 277
collection ZDB-32-STB
ZDB-4-NLEBK
ZDB-5-WPSE
ctrlnum (ZDB-32-STB)on1041858471
(OCoLC)1041858471
(DE-599)BVBBV045144483
discipline Informatik
edition Third edition
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02028nam a2200493zc 4500</leader><controlfield tag="001">BV045144483</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20200506 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180823s2018 xx a||| o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781788994200</subfield><subfield code="9">978-1-78899-420-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1788994205</subfield><subfield code="9">1-78899-420-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-32-STB)on1041858471</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1041858471</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045144483</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Jaswal, Nipun</subfield><subfield code="d">19XX-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1160324301</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Mastering Metasploit</subfield><subfield code="b">take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit</subfield><subfield code="c">Nipun Jaswal</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">Third edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham, UK ; Mumbai</subfield><subfield code="b">Packt</subfield><subfield code="c">May 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (vii, 472 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on online resource; title from title page (Safari, viewed June 25, 2018)</subfield></datafield><datafield tag="630" ind1="0" ind2="4"><subfield code="a">Metasploit (Electronic resource)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Penetrationstest</subfield><subfield code="0">(DE-588)4825817-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781788990615</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">http://proquest.tech.safaribooksonline.de/9781788990615</subfield><subfield code="x">Aggregator</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-32-STB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-NLEBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-5-WPSE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030534264</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://search.ebscohost.com/login.aspx?direct=true&amp;scope=site&amp;db=nlebk&amp;db=nlabk&amp;AN=1827509</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-4-NLEBK</subfield><subfield code="q">UBY01_DDA20</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection>
id DE-604.BV045144483
illustrated Illustrated
indexdate 2024-12-24T06:50:38Z
institution BVB
isbn 9781788994200
1788994205
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-030534264
oclc_num 1041858471
open_access_boolean
owner DE-706
owner_facet DE-706
physical 1 Online-Ressource (vii, 472 Seiten) Illustrationen
psigel ZDB-32-STB
ZDB-4-NLEBK
ZDB-5-WPSE
ZDB-4-NLEBK UBY01_DDA20
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Packt
record_format marc
spelling Jaswal, Nipun 19XX- Verfasser (DE-588)1160324301 aut
Mastering Metasploit take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit Nipun Jaswal
Third edition
Birmingham, UK ; Mumbai Packt May 2018
1 Online-Ressource (vii, 472 Seiten) Illustrationen
txt rdacontent
c rdamedia
cr rdacarrier
Description based on online resource; title from title page (Safari, viewed June 25, 2018)
Metasploit (Electronic resource)
Computer security
Computers Access control
Penetration testing (Computer security)
Penetrationstest (DE-588)4825817-9 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 gnd rswk-swf
Computersicherheit (DE-588)4274324-2 s
Penetrationstest (DE-588)4825817-9 s
DE-604
Erscheint auch als Druck-Ausgabe 9781788990615
http://proquest.tech.safaribooksonline.de/9781788990615 Aggregator URL des Erstveröffentlichers Volltext
spellingShingle Jaswal, Nipun 19XX-
Mastering Metasploit take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
Metasploit (Electronic resource)
Computer security
Computers Access control
Penetration testing (Computer security)
Penetrationstest (DE-588)4825817-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
subject_GND (DE-588)4825817-9
(DE-588)4274324-2
title Mastering Metasploit take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
title_auth Mastering Metasploit take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
title_exact_search Mastering Metasploit take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
title_full Mastering Metasploit take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit Nipun Jaswal
title_fullStr Mastering Metasploit take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit Nipun Jaswal
title_full_unstemmed Mastering Metasploit take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit Nipun Jaswal
title_short Mastering Metasploit
title_sort mastering metasploit take your penetration testing and it security skills to a whole new level with the secrets of metasploit
title_sub take your penetration testing and IT security skills to a whole new level with the secrets of Metasploit
topic Metasploit (Electronic resource)
Computer security
Computers Access control
Penetration testing (Computer security)
Penetrationstest (DE-588)4825817-9 gnd
Computersicherheit (DE-588)4274324-2 gnd
topic_facet Metasploit (Electronic resource)
Computer security
Computers Access control
Penetration testing (Computer security)
Penetrationstest
Computersicherheit
url http://proquest.tech.safaribooksonline.de/9781788990615
work_keys_str_mv AT jaswalnipun masteringmetasploittakeyourpenetrationtestinganditsecurityskillstoawholenewlevelwiththesecretsofmetasploit