Ethical hacking networks and websites

"Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scan...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Gupta, Sunil (RednerIn)
Format: Elektronisch Video
Sprache:English
Veröffentlicht: [Place of publication not identified] Apress 2018
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cgm a22000002 4500
001 ZDB-30-ORH-047610131
003 DE-627-1
005 20240228120633.0
006 m o | |
007 cr uuu---uuuuu
008 191023s2018 xx ||| |o o ||eng c
035 |a (DE-627-1)047610131 
035 |a (DE-599)KEP047610131 
035 |a (ORHE)9781484243411 
035 |a (DE-627-1)047610131 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
100 1 |a Gupta, Sunil  |e RednerIn  |4 spk 
245 1 0 |a Ethical hacking  |b networks and websites  |c Sunil Gupta 
264 1 |a [Place of publication not identified]  |b Apress  |c 2018 
300 |a 1 online resource (1 streaming video file (1 hr., 8 min., 56 sec.)) 
336 |a zweidimensionales bewegtes Bild  |b tdi  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Title from resource description page (Safari, viewed January 17, 2019) 
520 |a "Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scanning with the basic video course, you will now dive deep into these concepts. Starting with setting up your own network penetration lab, you take a look network footprinting, where you will learn to scan your network for vulnerabilities. Following this, you will learn various techniques to exploit your network and perform penetration tests using Kali Linux. Shifting focus to websites, you will go through the key techniques of website footprinting and also see how to find vulnerabilities in your website, where you will work with examples of website exploitation. Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites."--Resource description page 
650 0 |a Hacking 
650 0 |a Computer security 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures 
650 2 |a Computer Security 
650 4 |a Piratage informatique 
650 4 |a Sécurité informatique 
650 4 |a Tests d'intrusion 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Computer networks ; Security measures  |0 (OCoLC)fst00872341 
650 4 |a Computer security  |0 (OCoLC)fst00872484 
650 4 |a Hacking  |0 (OCoLC)fst01909643 
650 4 |a Penetration testing (Computer security)  |0 (OCoLC)fst01789566 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781484243411/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
935 |c vide 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047610131
_version_ 1818767391372345344
adam_text
any_adam_object
author2 Gupta, Sunil
author2_role spk
author2_variant s g sg
author_facet Gupta, Sunil
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047610131
(DE-599)KEP047610131
(ORHE)9781484243411
format Electronic
Video
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02758cgm a22004812 4500</leader><controlfield tag="001">ZDB-30-ORH-047610131</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228120633.0</controlfield><controlfield tag="006">m o | | </controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2018 xx ||| |o o ||eng c</controlfield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047610131</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047610131</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781484243411</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047610131</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Gupta, Sunil</subfield><subfield code="e">RednerIn</subfield><subfield code="4">spk</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Ethical hacking</subfield><subfield code="b">networks and websites</subfield><subfield code="c">Sunil Gupta</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[Place of publication not identified]</subfield><subfield code="b">Apress</subfield><subfield code="c">2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (1 streaming video file (1 hr., 8 min., 56 sec.))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">zweidimensionales bewegtes Bild</subfield><subfield code="b">tdi</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Title from resource description page (Safari, viewed January 17, 2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scanning with the basic video course, you will now dive deep into these concepts. Starting with setting up your own network penetration lab, you take a look network footprinting, where you will learn to scan your network for vulnerabilities. Following this, you will learn various techniques to exploit your network and perform penetration tests using Kali Linux. Shifting focus to websites, you will go through the key techniques of website footprinting and also see how to find vulnerabilities in your website, where you will work with examples of website exploitation. Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites."--Resource description page</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks ; Security measures</subfield><subfield code="0">(OCoLC)fst00872341</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="0">(OCoLC)fst00872484</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hacking</subfield><subfield code="0">(OCoLC)fst01909643</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield><subfield code="0">(OCoLC)fst01789566</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781484243411/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="935" ind1=" " ind2=" "><subfield code="c">vide</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047610131
illustrated Not Illustrated
indexdate 2024-12-18T08:49:08Z
institution BVB
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (1 streaming video file (1 hr., 8 min., 56 sec.))
psigel ZDB-30-ORH
publishDate 2018
publishDateSearch 2018
publishDateSort 2018
publisher Apress
record_format marc
spelling Gupta, Sunil RednerIn spk
Ethical hacking networks and websites Sunil Gupta
[Place of publication not identified] Apress 2018
1 online resource (1 streaming video file (1 hr., 8 min., 56 sec.))
zweidimensionales bewegtes Bild tdi rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Title from resource description page (Safari, viewed January 17, 2019)
"Take the next step in enhancing your ethical hacking skills. Having completed the basic tutorial, you should have a firm grasp of the basics of ethical hacking. This course will cover key aspects of network and website security. After gaining a basic view of footprinting and vulnerability scanning with the basic video course, you will now dive deep into these concepts. Starting with setting up your own network penetration lab, you take a look network footprinting, where you will learn to scan your network for vulnerabilities. Following this, you will learn various techniques to exploit your network and perform penetration tests using Kali Linux. Shifting focus to websites, you will go through the key techniques of website footprinting and also see how to find vulnerabilities in your website, where you will work with examples of website exploitation. Finally, you will cover injection attacks, a common exploit technique used to detect flaws and breaches in websites."--Resource description page
Hacking
Computer security
Penetration testing (Computer security)
Computer networks Security measures
Computer Security
Piratage informatique
Sécurité informatique
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures (OCoLC)fst00872341
Computer security (OCoLC)fst00872484
Hacking (OCoLC)fst01909643
Penetration testing (Computer security) (OCoLC)fst01789566
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781484243411/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Ethical hacking networks and websites
Hacking
Computer security
Penetration testing (Computer security)
Computer networks Security measures
Computer Security
Piratage informatique
Sécurité informatique
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures (OCoLC)fst00872341
Computer security (OCoLC)fst00872484
Hacking (OCoLC)fst01909643
Penetration testing (Computer security) (OCoLC)fst01789566
subject_GND (OCoLC)fst00872341
(OCoLC)fst00872484
(OCoLC)fst01909643
(OCoLC)fst01789566
title Ethical hacking networks and websites
title_auth Ethical hacking networks and websites
title_exact_search Ethical hacking networks and websites
title_full Ethical hacking networks and websites Sunil Gupta
title_fullStr Ethical hacking networks and websites Sunil Gupta
title_full_unstemmed Ethical hacking networks and websites Sunil Gupta
title_short Ethical hacking
title_sort ethical hacking networks and websites
title_sub networks and websites
topic Hacking
Computer security
Penetration testing (Computer security)
Computer networks Security measures
Computer Security
Piratage informatique
Sécurité informatique
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures (OCoLC)fst00872341
Computer security (OCoLC)fst00872484
Hacking (OCoLC)fst01909643
Penetration testing (Computer security) (OCoLC)fst01789566
topic_facet Hacking
Computer security
Penetration testing (Computer security)
Computer networks Security measures
Computer Security
Piratage informatique
Sécurité informatique
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Computer networks ; Security measures
url https://learning.oreilly.com/library/view/-/9781484243411/?ar
work_keys_str_mv AT guptasunil ethicalhackingnetworksandwebsites