Ethical hacking networks and websites
"Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scan...
Gespeichert in:
Weitere Verfasser: | |
---|---|
Format: | Elektronisch Video |
Sprache: | English |
Veröffentlicht: |
[Place of publication not identified]
Apress
2018
|
Schlagworte: | |
Online-Zugang: | lizenzpflichtig |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
MARC
LEADER | 00000cgm a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047610131 | ||
003 | DE-627-1 | ||
005 | 20240228120633.0 | ||
006 | m o | | | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2018 xx ||| |o o ||eng c | ||
035 | |a (DE-627-1)047610131 | ||
035 | |a (DE-599)KEP047610131 | ||
035 | |a (ORHE)9781484243411 | ||
035 | |a (DE-627-1)047610131 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
100 | 1 | |a Gupta, Sunil |e RednerIn |4 spk | |
245 | 1 | 0 | |a Ethical hacking |b networks and websites |c Sunil Gupta |
264 | 1 | |a [Place of publication not identified] |b Apress |c 2018 | |
300 | |a 1 online resource (1 streaming video file (1 hr., 8 min., 56 sec.)) | ||
336 | |a zweidimensionales bewegtes Bild |b tdi |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Title from resource description page (Safari, viewed January 17, 2019) | ||
520 | |a "Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scanning with the basic video course, you will now dive deep into these concepts. Starting with setting up your own network penetration lab, you take a look network footprinting, where you will learn to scan your network for vulnerabilities. Following this, you will learn various techniques to exploit your network and perform penetration tests using Kali Linux. Shifting focus to websites, you will go through the key techniques of website footprinting and also see how to find vulnerabilities in your website, where you will work with examples of website exploitation. Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites."--Resource description page | ||
650 | 0 | |a Hacking | |
650 | 0 | |a Computer security | |
650 | 0 | |a Penetration testing (Computer security) | |
650 | 0 | |a Computer networks |x Security measures | |
650 | 2 | |a Computer Security | |
650 | 4 | |a Piratage informatique | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a Tests d'intrusion | |
650 | 4 | |a Réseaux d'ordinateurs ; Sécurité ; Mesures | |
650 | 4 | |a Computer networks ; Security measures |0 (OCoLC)fst00872341 | |
650 | 4 | |a Computer security |0 (OCoLC)fst00872484 | |
650 | 4 | |a Hacking |0 (OCoLC)fst01909643 | |
650 | 4 | |a Penetration testing (Computer security) |0 (OCoLC)fst01789566 | |
856 | 4 | 0 | |l TUM01 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781484243411/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
935 | |c vide | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047610131 |
---|---|
_version_ | 1818767391372345344 |
adam_text | |
any_adam_object | |
author2 | Gupta, Sunil |
author2_role | spk |
author2_variant | s g sg |
author_facet | Gupta, Sunil |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047610131 (DE-599)KEP047610131 (ORHE)9781484243411 |
format | Electronic Video |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02758cgm a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-047610131</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120633.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047610131</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047610131</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484243411</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047610131</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gupta, Sunil</subfield><subfield code="e">RednerIn</subfield><subfield code="4">spk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical hacking</subfield><subfield code="b">networks and websites</subfield><subfield code="c">Sunil Gupta</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Apress</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 streaming video file (1 hr., 8 min., 56 sec.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from resource description page (Safari, viewed January 17, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scanning with the basic video course, you will now dive deep into these concepts. Starting with setting up your own network penetration lab, you take a look network footprinting, where you will learn to scan your network for vulnerabilities. Following this, you will learn various techniques to exploit your network and perform penetration tests using Kali Linux. Shifting focus to websites, you will go through the key techniques of website footprinting and also see how to find vulnerabilities in your website, where you will work with examples of website exploitation. Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites."--Resource description page</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield><subfield code="0">(OCoLC)fst00872341</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="0">(OCoLC)fst00872484</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield><subfield code="0">(OCoLC)fst01909643</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">(OCoLC)fst01789566</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484243411/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047610131 |
illustrated | Not Illustrated |
indexdate | 2024-12-18T08:49:08Z |
institution | BVB |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 online resource (1 streaming video file (1 hr., 8 min., 56 sec.)) |
psigel | ZDB-30-ORH |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Apress |
record_format | marc |
spelling | Gupta, Sunil RednerIn spk Ethical hacking networks and websites Sunil Gupta [Place of publication not identified] Apress 2018 1 online resource (1 streaming video file (1 hr., 8 min., 56 sec.)) zweidimensionales bewegtes Bild tdi rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Title from resource description page (Safari, viewed January 17, 2019) "Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scanning with the basic video course, you will now dive deep into these concepts. Starting with setting up your own network penetration lab, you take a look network footprinting, where you will learn to scan your network for vulnerabilities. Following this, you will learn various techniques to exploit your network and perform penetration tests using Kali Linux. Shifting focus to websites, you will go through the key techniques of website footprinting and also see how to find vulnerabilities in your website, where you will work with examples of website exploitation. Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites."--Resource description page Hacking Computer security Penetration testing (Computer security) Computer networks Security measures Computer Security Piratage informatique Sécurité informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Hacking (OCoLC)fst01909643 Penetration testing (Computer security) (OCoLC)fst01789566 TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781484243411/?ar X:ORHE Aggregator lizenzpflichtig Volltext |
spellingShingle | Ethical hacking networks and websites Hacking Computer security Penetration testing (Computer security) Computer networks Security measures Computer Security Piratage informatique Sécurité informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Hacking (OCoLC)fst01909643 Penetration testing (Computer security) (OCoLC)fst01789566 |
subject_GND | (OCoLC)fst00872341 (OCoLC)fst00872484 (OCoLC)fst01909643 (OCoLC)fst01789566 |
title | Ethical hacking networks and websites |
title_auth | Ethical hacking networks and websites |
title_exact_search | Ethical hacking networks and websites |
title_full | Ethical hacking networks and websites Sunil Gupta |
title_fullStr | Ethical hacking networks and websites Sunil Gupta |
title_full_unstemmed | Ethical hacking networks and websites Sunil Gupta |
title_short | Ethical hacking |
title_sort | ethical hacking networks and websites |
title_sub | networks and websites |
topic | Hacking Computer security Penetration testing (Computer security) Computer networks Security measures Computer Security Piratage informatique Sécurité informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures (OCoLC)fst00872341 Computer security (OCoLC)fst00872484 Hacking (OCoLC)fst01909643 Penetration testing (Computer security) (OCoLC)fst01789566 |
topic_facet | Hacking Computer security Penetration testing (Computer security) Computer networks Security measures Computer Security Piratage informatique Sécurité informatique Tests d'intrusion Réseaux d'ordinateurs ; Sécurité ; Mesures Computer networks ; Security measures |
url | https://learning.oreilly.com/library/view/-/9781484243411/?ar |
work_keys_str_mv | AT guptasunil ethicalhackingnetworksandwebsites |