Learning Kali Linux security testing, penetration testing & ethical hacking

With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the too...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Messier, Ric (VerfasserIn)
Format: Elektronisch E-Book
Sprache:English
Veröffentlicht: Sebastopol O'Reilly Media, Incorporated 2024
Ausgabe:2nd ed.
Schlagworte:
Online-Zugang:lizenzpflichtig
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000cam a22000002 4500
001 ZDB-30-ORH-106608932
003 DE-627-1
005 20241001123257.0
007 cr uuu---uuuuu
008 240902s2024 xx |||||o 00| ||eng c
020 |a 9781098154097  |9 978-1-0981-5409-7 
020 |a 1098154096  |9 1-0981-5409-6 
035 |a (DE-627-1)106608932 
035 |a (DE-599)KEP106608932 
035 |a (ORHE)9781098154127 
035 |a (DE-627-1)106608932 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
082 0 |a 005.8  |2 23/eng/20240819 
100 1 |a Messier, Ric  |e VerfasserIn  |4 aut 
245 1 0 |a Learning Kali Linux  |b security testing, penetration testing & ethical hacking  |c Ric Messier 
250 |a 2nd ed. 
264 1 |a Sebastopol  |b O'Reilly Media, Incorporated  |c 2024 
300 |a 1 online resource (542 p.) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
500 |a Description based upon print version of record. - WPS Attacks 
520 |a With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and reverse engineering. Author Ric Messier also goes beyond strict security testing by adding coverage on performing forensic analysis, including disk and memory forensics, as well as some basic malware analysis. Explore the breadth of tools available on Kali Linux Understand the value of security testing and examine the testing types available Learn the basics of penetration testing through the entire attack lifecycle Install Kali Linux on multiple systems, both physical and virtual Discover how to use different security-focused tools Structure a security test around Kali Linux tools Extend Kali tools to create advanced attack techniques Use Kali Linux to generate reports once testing is complete. 
630 2 0 |a Kali Linux 
650 0 |a Penetration testing (Computer security) 
650 0 |a Computer networks  |x Security measures 
650 0 |a Hacking 
650 4 |a Tests d'intrusion 
650 4 |a Réseaux d'ordinateurs ; Sécurité ; Mesures 
650 4 |a Piratage informatique 
776 1 |z 9781098154134 
776 0 8 |i Erscheint auch als  |n Druck-Ausgabe  |z 9781098154134 
856 4 0 |l TUM01  |p ZDB-30-ORH  |q TUM_PDA_ORH  |u https://learning.oreilly.com/library/view/-/9781098154127/?ar  |m X:ORHE  |x Aggregator  |z lizenzpflichtig  |3 Volltext 
912 |a ZDB-30-ORH 
951 |a BO 
912 |a ZDB-30-ORH 
049 |a DE-91 

Datensatz im Suchindex

DE-BY-TUM_katkey ZDB-30-ORH-106608932
_version_ 1818767365291114496
adam_text
any_adam_object
author Messier, Ric
author_facet Messier, Ric
author_role aut
author_sort Messier, Ric
author_variant r m rm
building Verbundindex
bvnumber localTUM
collection ZDB-30-ORH
ctrlnum (DE-627-1)106608932
(DE-599)KEP106608932
(ORHE)9781098154127
dewey-full 005.8
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.8
dewey-search 005.8
dewey-sort 15.8
dewey-tens 000 - Computer science, information, general works
discipline Informatik
edition 2nd ed.
format Electronic
eBook
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02629cam a22004572 4500</leader><controlfield tag="001">ZDB-30-ORH-106608932</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20241001123257.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">240902s2024 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781098154097</subfield><subfield code="9">978-1-0981-5409-7</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1098154096</subfield><subfield code="9">1-0981-5409-6</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)106608932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP106608932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781098154127</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)106608932</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23/eng/20240819</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Messier, Ric</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Learning Kali Linux</subfield><subfield code="b">security testing, penetration testing &amp; ethical hacking</subfield><subfield code="c">Ric Messier</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Sebastopol</subfield><subfield code="b">O'Reilly Media, Incorporated</subfield><subfield code="c">2024</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (542 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based upon print version of record. - WPS Attacks</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and reverse engineering. Author Ric Messier also goes beyond strict security testing by adding coverage on performing forensic analysis, including disk and memory forensics, as well as some basic malware analysis. Explore the breadth of tools available on Kali Linux Understand the value of security testing and examine the testing types available Learn the basics of penetration testing through the entire attack lifecycle Install Kali Linux on multiple systems, both physical and virtual Discover how to use different security-focused tools Structure a security test around Kali Linux tools Extend Kali tools to create advanced attack techniques Use Kali Linux to generate reports once testing is complete.</subfield></datafield><datafield tag="630" ind1="2" ind2="0"><subfield code="a">Kali Linux</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Penetration testing (Computer security)</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Tests d'intrusion</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Réseaux d'ordinateurs ; Sécurité ; Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piratage informatique</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781098154134</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781098154134</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">TUM01</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781098154127/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection>
id ZDB-30-ORH-106608932
illustrated Not Illustrated
indexdate 2024-12-18T08:48:43Z
institution BVB
isbn 9781098154097
1098154096
language English
open_access_boolean
owner DE-91
DE-BY-TUM
owner_facet DE-91
DE-BY-TUM
physical 1 online resource (542 p.)
psigel ZDB-30-ORH
publishDate 2024
publishDateSearch 2024
publishDateSort 2024
publisher O'Reilly Media, Incorporated
record_format marc
spelling Messier, Ric VerfasserIn aut
Learning Kali Linux security testing, penetration testing & ethical hacking Ric Messier
2nd ed.
Sebastopol O'Reilly Media, Incorporated 2024
1 online resource (542 p.)
Text txt rdacontent
Computermedien c rdamedia
Online-Ressource cr rdacarrier
Description based upon print version of record. - WPS Attacks
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and reverse engineering. Author Ric Messier also goes beyond strict security testing by adding coverage on performing forensic analysis, including disk and memory forensics, as well as some basic malware analysis. Explore the breadth of tools available on Kali Linux Understand the value of security testing and examine the testing types available Learn the basics of penetration testing through the entire attack lifecycle Install Kali Linux on multiple systems, both physical and virtual Discover how to use different security-focused tools Structure a security test around Kali Linux tools Extend Kali tools to create advanced attack techniques Use Kali Linux to generate reports once testing is complete.
Kali Linux
Penetration testing (Computer security)
Computer networks Security measures
Hacking
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Piratage informatique
9781098154134
Erscheint auch als Druck-Ausgabe 9781098154134
TUM01 ZDB-30-ORH TUM_PDA_ORH https://learning.oreilly.com/library/view/-/9781098154127/?ar X:ORHE Aggregator lizenzpflichtig Volltext
spellingShingle Messier, Ric
Learning Kali Linux security testing, penetration testing & ethical hacking
Kali Linux
Penetration testing (Computer security)
Computer networks Security measures
Hacking
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Piratage informatique
title Learning Kali Linux security testing, penetration testing & ethical hacking
title_auth Learning Kali Linux security testing, penetration testing & ethical hacking
title_exact_search Learning Kali Linux security testing, penetration testing & ethical hacking
title_full Learning Kali Linux security testing, penetration testing & ethical hacking Ric Messier
title_fullStr Learning Kali Linux security testing, penetration testing & ethical hacking Ric Messier
title_full_unstemmed Learning Kali Linux security testing, penetration testing & ethical hacking Ric Messier
title_short Learning Kali Linux
title_sort learning kali linux security testing penetration testing ethical hacking
title_sub security testing, penetration testing & ethical hacking
topic Kali Linux
Penetration testing (Computer security)
Computer networks Security measures
Hacking
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Piratage informatique
topic_facet Kali Linux
Penetration testing (Computer security)
Computer networks Security measures
Hacking
Tests d'intrusion
Réseaux d'ordinateurs ; Sécurité ; Mesures
Piratage informatique
url https://learning.oreilly.com/library/view/-/9781098154127/?ar
work_keys_str_mv AT messierric learningkalilinuxsecuritytestingpenetrationtestingethicalhacking