Coding for penetration testers building better tools

Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default c...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Andress, Jason (VerfasserIn), Linn, Ryan (VerfasserIn)
Weitere Verfasser: Rogers, Russ (HerausgeberIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Waltham, Mass. Syngress 2012
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-047648260
003 DE-627-1
005 20240228115024.0
007 cr uuu---uuuuu
008 191023s2012 xx |||||o 00| ||eng c
020 |a 9781597497305  |c electronic bk.  |9 978-1-59749-730-5 
020 |a 1597497304  |c electronic bk.  |9 1-59749-730-4 
020 |a 1597497290  |9 1-59749-729-0 
020 |a 9781597497299  |9 978-1-59749-729-9 
020 |a 0128054735  |9 0-12-805473-5 
020 |a 9780128054734  |9 978-0-12-805473-4 
020 |a 9781283293808  |c online  |9 978-1-283-29380-8 
020 |a 1283293803  |9 1-283-29380-3 
035 |a (DE-627-1)047648260 
035 |a (DE-599)KEP047648260 
035 |a (ORHE)9781597497305 
035 |a (DE-627-1)047648260 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
072 7 |a COM  |2 bisacsh 
072 7 |a COM  |2 bisacsh 
072 7 |a COM  |2 bisacsh 
082 0 |a 005.8  |2 23 
100 1 |a Andress, Jason  |e VerfasserIn  |4 aut 
245 1 0 |a Coding for penetration testers  |b building better tools  |c Jason Andress, Ryan Linn ; technical editor, Russ Rogers 
264 1 |a Waltham, Mass.  |b Syngress  |c 2012 
300 |a 1 online resource 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Includes bibliographical references and index. - Print version record 
520 |a Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of coding for the related programming language. Coding for Penetration Testers provides the reader with an understanding of the scripting languages that are commonly used when developing tools for penetration testing. It also guides the. 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures  |x Testing 
650 4 |a Tests d'intrusion 
650 4 |a COMPUTERS ; Internet ; Security 
650 4 |a COMPUTERS ; Networking ; Security 
650 4 |a COMPUTERS ; Security ; General 
650 4 |a Penetration testing (Computer security) 
700 1 |a Linn, Ryan  |e VerfasserIn  |4 aut 
700 1 |a Rogers, Russ  |e HerausgeberIn  |4 edt 
776 1 |z 9781597497299 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781597497299 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781597497305/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-047648260
_version_ 1818767300920082432
adam_text
any_adam_object
author Andress, Jason
Linn, Ryan
author2 Rogers, Russ
author2_role edt
author2_variant r r rr
author_facet Andress, Jason
Linn, Ryan
Rogers, Russ
author_role aut
aut
author_sort Andress, Jason
author_variant j a ja
r l rl
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)047648260
(DE-599)KEP047648260
(ORHE)9781597497305
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02706cam a22005892 4500</leader><controlfield tag="001">ZDB-30-ORH-047648260</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115024.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2012 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597497305</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">978-1-59749-730-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597497304</subfield><subfield code="c">electronic bk.</subfield><subfield code="9">1-59749-730-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1597497290</subfield><subfield code="9">1-59749-729-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781597497299</subfield><subfield code="9">978-1-59749-729-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128054735</subfield><subfield code="9">0-12-805473-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128054734</subfield><subfield code="9">978-0-12-805473-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781283293808</subfield><subfield code="c">online</subfield><subfield code="9">978-1-283-29380-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1283293803</subfield><subfield code="9">1-283-29380-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648260</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047648260</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781597497305</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047648260</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Andress, Jason</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Coding for penetration testers</subfield><subfield code="b">building better tools</subfield><subfield code="c">Jason Andress, Ryan Linn ; technical editor, Russ Rogers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Waltham, Mass.</subfield><subfield code="b">Syngress</subfield><subfield code="c">2012</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of coding for the related programming language. Coding for Penetration Testers provides the reader with an understanding of the scripting languages that are commonly used when developing tools for penetration testing. It also guides the.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield><subfield code="x">Testing</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Linn, Ryan</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rogers, Russ</subfield><subfield code="e">HerausgeberIn</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781597497299</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781597497299</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781597497305/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-047648260
illustrated Not Illustrated
indexdate 2024-12-18T08:47:42Z
institution BVB
isbn 9781597497305
1597497304
1597497290
9781597497299
0128054735
9780128054734
9781283293808
1283293803
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource
psigel ZDB-30-ORH
publishDate 2012
publishDateSearch 2012
publishDateSort 2012
publisher Syngress
record_format marc
spelling Andress, Jason VerfasserIn aut
Coding for penetration testers building better tools Jason Andress, Ryan Linn ; technical editor, Russ Rogers
Waltham, Mass. Syngress 2012
1 online resource
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Includes bibliographical references and index. - Print version record
Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of coding for the related programming language. Coding for Penetration Testers provides the reader with an understanding of the scripting languages that are commonly used when developing tools for penetration testing. It also guides the.
Penetration testing (Computer security)
Computer networks Security measures Testing
Tests d'intrusion
COMPUTERS ; Internet ; Security
COMPUTERS ; Networking ; Security
COMPUTERS ; Security ; General
Linn, Ryan VerfasserIn aut
Rogers, Russ HerausgeberIn edt
9781597497299
Erscheint auch als Druck-Ausgabe 9781597497299
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781597497305/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Andress, Jason
Linn, Ryan
Coding for penetration testers building better tools
Penetration testing (Computer security)
Computer networks Security measures Testing
Tests d'intrusion
COMPUTERS ; Internet ; Security
COMPUTERS ; Networking ; Security
COMPUTERS ; Security ; General
title Coding for penetration testers building better tools
title_auth Coding for penetration testers building better tools
title_exact_search Coding for penetration testers building better tools
title_full Coding for penetration testers building better tools Jason Andress, Ryan Linn ; technical editor, Russ Rogers
title_fullStr Coding for penetration testers building better tools Jason Andress, Ryan Linn ; technical editor, Russ Rogers
title_full_unstemmed Coding for penetration testers building better tools Jason Andress, Ryan Linn ; technical editor, Russ Rogers
title_short Coding for penetration testers
title_sort coding for penetration testers building better tools
title_sub building better tools
topic Penetration testing (Computer security)
Computer networks Security measures Testing
Tests d'intrusion
COMPUTERS ; Internet ; Security
COMPUTERS ; Networking ; Security
COMPUTERS ; Security ; General
topic_facet Penetration testing (Computer security)
Computer networks Security measures Testing
Tests d'intrusion
COMPUTERS ; Internet ; Security
COMPUTERS ; Networking ; Security
COMPUTERS ; Security ; General
url https://learning.oreilly.com/library/view/-/9781597497305/?ar
work_keys_str_mv AT andressjason codingforpenetrationtestersbuildingbettertools
AT linnryan codingforpenetrationtestersbuildingbettertools
AT rogersruss codingforpenetrationtestersbuildingbettertools